Analysis

  • max time kernel
    119s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/03/2023, 22:36

General

  • Target

    709a4477422b83973642c8f5d14d6ccf167e2e7695c47b19f1cdae6dd36086aa.exe

  • Size

    1.0MB

  • MD5

    87c825d4cdad49e7a0d6698680e87996

  • SHA1

    e7d3dd40f5b05362bd0a0fb672cfb7a0b3204d63

  • SHA256

    709a4477422b83973642c8f5d14d6ccf167e2e7695c47b19f1cdae6dd36086aa

  • SHA512

    144c10a2771fef2243f590d493649253c520957439270d7d1362e4d2c4a87c17a8f667590c4c77b660152a54fd50d04d565b4a625db35814dfcb345e0f4f7970

  • SSDEEP

    24576:Fy7i62XmzbBxDadVoNCOy5YzeVUKezkVYXmPy:gFD3DgVo0XYz3gV4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

budda

C2

176.113.115.145:4125

Attributes
  • auth_value

    817135bbb606487d8a499e3dc1974b43

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\709a4477422b83973642c8f5d14d6ccf167e2e7695c47b19f1cdae6dd36086aa.exe
    "C:\Users\Admin\AppData\Local\Temp\709a4477422b83973642c8f5d14d6ccf167e2e7695c47b19f1cdae6dd36086aa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5312.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5312.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1133.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1133.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4140
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7929.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7929.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2264
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu018425.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu018425.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2368
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1607.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1607.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4456
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dKI12s70.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dKI12s70.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en753620.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en753620.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge919022.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge919022.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3828
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4436
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4716
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4864
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3384
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4252
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:1876
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3228
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4920
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4216
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:5084
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:5024

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                      Filesize

                      226KB

                      MD5

                      bc83d8334a9762fac69149933b21c277

                      SHA1

                      250f1d76ded948a07a2bf61b708b24f624f7a900

                      SHA256

                      75a83ffc7044d901f0a8396484670427f283033d40bc93d277af53729d8f6402

                      SHA512

                      6c9880c4e459d58d73695c38505a62e4048077b21dcc21b281ef4697e14a3098cda662b421a0ddce8ae09b58e5760a83ddf0a16a4ef693eb64fae7e5f7235e56

                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                      Filesize

                      226KB

                      MD5

                      bc83d8334a9762fac69149933b21c277

                      SHA1

                      250f1d76ded948a07a2bf61b708b24f624f7a900

                      SHA256

                      75a83ffc7044d901f0a8396484670427f283033d40bc93d277af53729d8f6402

                      SHA512

                      6c9880c4e459d58d73695c38505a62e4048077b21dcc21b281ef4697e14a3098cda662b421a0ddce8ae09b58e5760a83ddf0a16a4ef693eb64fae7e5f7235e56

                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                      Filesize

                      226KB

                      MD5

                      bc83d8334a9762fac69149933b21c277

                      SHA1

                      250f1d76ded948a07a2bf61b708b24f624f7a900

                      SHA256

                      75a83ffc7044d901f0a8396484670427f283033d40bc93d277af53729d8f6402

                      SHA512

                      6c9880c4e459d58d73695c38505a62e4048077b21dcc21b281ef4697e14a3098cda662b421a0ddce8ae09b58e5760a83ddf0a16a4ef693eb64fae7e5f7235e56

                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                      Filesize

                      226KB

                      MD5

                      bc83d8334a9762fac69149933b21c277

                      SHA1

                      250f1d76ded948a07a2bf61b708b24f624f7a900

                      SHA256

                      75a83ffc7044d901f0a8396484670427f283033d40bc93d277af53729d8f6402

                      SHA512

                      6c9880c4e459d58d73695c38505a62e4048077b21dcc21b281ef4697e14a3098cda662b421a0ddce8ae09b58e5760a83ddf0a16a4ef693eb64fae7e5f7235e56

                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                      Filesize

                      226KB

                      MD5

                      bc83d8334a9762fac69149933b21c277

                      SHA1

                      250f1d76ded948a07a2bf61b708b24f624f7a900

                      SHA256

                      75a83ffc7044d901f0a8396484670427f283033d40bc93d277af53729d8f6402

                      SHA512

                      6c9880c4e459d58d73695c38505a62e4048077b21dcc21b281ef4697e14a3098cda662b421a0ddce8ae09b58e5760a83ddf0a16a4ef693eb64fae7e5f7235e56

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge919022.exe

                      Filesize

                      226KB

                      MD5

                      bc83d8334a9762fac69149933b21c277

                      SHA1

                      250f1d76ded948a07a2bf61b708b24f624f7a900

                      SHA256

                      75a83ffc7044d901f0a8396484670427f283033d40bc93d277af53729d8f6402

                      SHA512

                      6c9880c4e459d58d73695c38505a62e4048077b21dcc21b281ef4697e14a3098cda662b421a0ddce8ae09b58e5760a83ddf0a16a4ef693eb64fae7e5f7235e56

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge919022.exe

                      Filesize

                      226KB

                      MD5

                      bc83d8334a9762fac69149933b21c277

                      SHA1

                      250f1d76ded948a07a2bf61b708b24f624f7a900

                      SHA256

                      75a83ffc7044d901f0a8396484670427f283033d40bc93d277af53729d8f6402

                      SHA512

                      6c9880c4e459d58d73695c38505a62e4048077b21dcc21b281ef4697e14a3098cda662b421a0ddce8ae09b58e5760a83ddf0a16a4ef693eb64fae7e5f7235e56

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5312.exe

                      Filesize

                      873KB

                      MD5

                      ebe8237772eace03207c5285eb624549

                      SHA1

                      9ffc1dc4994232304051e5b458616c708d7a6435

                      SHA256

                      74e86d203a1f79a026635a636b08878493cfcc4d24b2824ed76b4fbc948d1fc8

                      SHA512

                      e87ba4b08142825abfa3291c5756adf5c8f4f5b13d6e205e05b61b3951a30186e09197c18a80ab9daac14dbf71b194994ce8de5bbeaae7c493c6fbf899cf93c4

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5312.exe

                      Filesize

                      873KB

                      MD5

                      ebe8237772eace03207c5285eb624549

                      SHA1

                      9ffc1dc4994232304051e5b458616c708d7a6435

                      SHA256

                      74e86d203a1f79a026635a636b08878493cfcc4d24b2824ed76b4fbc948d1fc8

                      SHA512

                      e87ba4b08142825abfa3291c5756adf5c8f4f5b13d6e205e05b61b3951a30186e09197c18a80ab9daac14dbf71b194994ce8de5bbeaae7c493c6fbf899cf93c4

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en753620.exe

                      Filesize

                      175KB

                      MD5

                      46a51a23e75b355a3e21cc7664f21ed3

                      SHA1

                      cbd48a908b5bc23c1fc45d011b7fe4d6cd2c2296

                      SHA256

                      e7b48d9e288197461a50fe2578988173f562198a7ef832a8dcfdd13c4b22feb6

                      SHA512

                      845cc7d304c9a0aa5907fa9b8142557145e8adbb789418d201a59601bf8e6ad1aa951ba46f16118425f0b21651f76801b00e48d65d0f1151a2ccff5057ed39d2

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en753620.exe

                      Filesize

                      175KB

                      MD5

                      46a51a23e75b355a3e21cc7664f21ed3

                      SHA1

                      cbd48a908b5bc23c1fc45d011b7fe4d6cd2c2296

                      SHA256

                      e7b48d9e288197461a50fe2578988173f562198a7ef832a8dcfdd13c4b22feb6

                      SHA512

                      845cc7d304c9a0aa5907fa9b8142557145e8adbb789418d201a59601bf8e6ad1aa951ba46f16118425f0b21651f76801b00e48d65d0f1151a2ccff5057ed39d2

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1133.exe

                      Filesize

                      730KB

                      MD5

                      4abf5eb9dfb706ce338c6c2b1ad54e0d

                      SHA1

                      67ad59806f5340af41e131dd1bbd0adccd329d8d

                      SHA256

                      54e436dd3c92eae662a6541db0a8f364314c61fa68871c7fade4364ebf758059

                      SHA512

                      739efc3fe0af7fced496d75e26edd6b339113c7a9b65ef7f41306ee2076300d9ef74abfc7c98ef62e9e4807b5e7e38cd588413dbec557570b320debc2e136338

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1133.exe

                      Filesize

                      730KB

                      MD5

                      4abf5eb9dfb706ce338c6c2b1ad54e0d

                      SHA1

                      67ad59806f5340af41e131dd1bbd0adccd329d8d

                      SHA256

                      54e436dd3c92eae662a6541db0a8f364314c61fa68871c7fade4364ebf758059

                      SHA512

                      739efc3fe0af7fced496d75e26edd6b339113c7a9b65ef7f41306ee2076300d9ef74abfc7c98ef62e9e4807b5e7e38cd588413dbec557570b320debc2e136338

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dKI12s70.exe

                      Filesize

                      403KB

                      MD5

                      2bff94e7d160f243349b7c244e2eff27

                      SHA1

                      b452a58c74183fd326cf89d179872e06dde6f8ef

                      SHA256

                      b2203bb1c41bd9320d33ee9d8a2a0368cae0482ba517d4cf556ce85e0c17e444

                      SHA512

                      05105d36767e3fe8fdf913802090284936d63f5854664b6293c772d532d59a1f7b9460f84a8ea8ed92486dcbe7c687220ebfcf0806c1938355ce1b04f1739b53

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dKI12s70.exe

                      Filesize

                      403KB

                      MD5

                      2bff94e7d160f243349b7c244e2eff27

                      SHA1

                      b452a58c74183fd326cf89d179872e06dde6f8ef

                      SHA256

                      b2203bb1c41bd9320d33ee9d8a2a0368cae0482ba517d4cf556ce85e0c17e444

                      SHA512

                      05105d36767e3fe8fdf913802090284936d63f5854664b6293c772d532d59a1f7b9460f84a8ea8ed92486dcbe7c687220ebfcf0806c1938355ce1b04f1739b53

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7929.exe

                      Filesize

                      362KB

                      MD5

                      444976aa49ec28b7b57be68ac65fd8fb

                      SHA1

                      2274837cbd2397bb6b4b3327d1bca3237508cffc

                      SHA256

                      4961a66f65e83d37fbc02ff47de826cfa1ca079eded56264990e8760d176f65a

                      SHA512

                      161864c6f7defe69376ac06ea4458910586bbf1d593dc02bf8f319a758fc1a56870744e00af86371c620b06f81ca4a333ee53860bed657214ae8311400c2ecea

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7929.exe

                      Filesize

                      362KB

                      MD5

                      444976aa49ec28b7b57be68ac65fd8fb

                      SHA1

                      2274837cbd2397bb6b4b3327d1bca3237508cffc

                      SHA256

                      4961a66f65e83d37fbc02ff47de826cfa1ca079eded56264990e8760d176f65a

                      SHA512

                      161864c6f7defe69376ac06ea4458910586bbf1d593dc02bf8f319a758fc1a56870744e00af86371c620b06f81ca4a333ee53860bed657214ae8311400c2ecea

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu018425.exe

                      Filesize

                      12KB

                      MD5

                      55338f8f7139ae3d32133e2795d867ab

                      SHA1

                      20b204269d356e51f3a7a3dd29e4b5ebf9a0b03d

                      SHA256

                      86d6c71498b530fc4a7520018f769ff7c841ecd91372dd0599f1fb97b199f68c

                      SHA512

                      833afe559834a20b951343fa22cb07ebf8f3e49e16527c6c7cd4dc9c42825a550e002277cf8e593e98f50608dec6de537563f6a8c751eca18884a20cef807c64

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu018425.exe

                      Filesize

                      12KB

                      MD5

                      55338f8f7139ae3d32133e2795d867ab

                      SHA1

                      20b204269d356e51f3a7a3dd29e4b5ebf9a0b03d

                      SHA256

                      86d6c71498b530fc4a7520018f769ff7c841ecd91372dd0599f1fb97b199f68c

                      SHA512

                      833afe559834a20b951343fa22cb07ebf8f3e49e16527c6c7cd4dc9c42825a550e002277cf8e593e98f50608dec6de537563f6a8c751eca18884a20cef807c64

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1607.exe

                      Filesize

                      345KB

                      MD5

                      38f0d61b1504b6a7a57550b8a51f3d11

                      SHA1

                      ec95d6214f09627d8ef778a24d7a0bf0f28fca0b

                      SHA256

                      b0baa83cbfb3bddd7aa182f14036d2d80225f530e0c4e00f5412cf3eb1e6f3d0

                      SHA512

                      06cb9d2266f94b831c0c8d205464199f90d0358e5acdddbf2a529dd9af04cfe4f85dc8d718f54cd8f12095eb8df7ea04edd1da52240994b92cc481c9ac766422

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1607.exe

                      Filesize

                      345KB

                      MD5

                      38f0d61b1504b6a7a57550b8a51f3d11

                      SHA1

                      ec95d6214f09627d8ef778a24d7a0bf0f28fca0b

                      SHA256

                      b0baa83cbfb3bddd7aa182f14036d2d80225f530e0c4e00f5412cf3eb1e6f3d0

                      SHA512

                      06cb9d2266f94b831c0c8d205464199f90d0358e5acdddbf2a529dd9af04cfe4f85dc8d718f54cd8f12095eb8df7ea04edd1da52240994b92cc481c9ac766422

                    • memory/2368-145-0x00000000006E0000-0x00000000006EA000-memory.dmp

                      Filesize

                      40KB

                    • memory/2960-1110-0x0000000007FF0000-0x000000000803B000-memory.dmp

                      Filesize

                      300KB

                    • memory/2960-222-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-1121-0x00000000049D0000-0x00000000049E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2960-1120-0x0000000008CF0000-0x000000000921C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/2960-1119-0x0000000008B00000-0x0000000008CC2000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/2960-1118-0x0000000008AB0000-0x0000000008B00000-memory.dmp

                      Filesize

                      320KB

                    • memory/2960-1117-0x0000000008A30000-0x0000000008AA6000-memory.dmp

                      Filesize

                      472KB

                    • memory/2960-1116-0x00000000049D0000-0x00000000049E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2960-1115-0x00000000049D0000-0x00000000049E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2960-1114-0x00000000049D0000-0x00000000049E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2960-1113-0x0000000008720000-0x00000000087B2000-memory.dmp

                      Filesize

                      584KB

                    • memory/2960-1112-0x0000000008180000-0x00000000081E6000-memory.dmp

                      Filesize

                      408KB

                    • memory/2960-1109-0x00000000049D0000-0x00000000049E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2960-1108-0x0000000007EA0000-0x0000000007EDE000-memory.dmp

                      Filesize

                      248KB

                    • memory/2960-1107-0x0000000007E80000-0x0000000007E92000-memory.dmp

                      Filesize

                      72KB

                    • memory/2960-193-0x00000000070D0000-0x0000000007116000-memory.dmp

                      Filesize

                      280KB

                    • memory/2960-194-0x0000000007650000-0x0000000007694000-memory.dmp

                      Filesize

                      272KB

                    • memory/2960-195-0x0000000002BA0000-0x0000000002BEB000-memory.dmp

                      Filesize

                      300KB

                    • memory/2960-196-0x00000000049D0000-0x00000000049E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2960-197-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-199-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-198-0x00000000049D0000-0x00000000049E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2960-202-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-204-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-200-0x00000000049D0000-0x00000000049E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2960-206-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-208-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-210-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-212-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-214-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-216-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-218-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-220-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-1106-0x0000000007D40000-0x0000000007E4A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/2960-224-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-226-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-228-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-230-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-232-0x0000000007650000-0x000000000768F000-memory.dmp

                      Filesize

                      252KB

                    • memory/2960-1105-0x00000000076B0000-0x0000000007CB6000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/4336-1127-0x0000000000A40000-0x0000000000A72000-memory.dmp

                      Filesize

                      200KB

                    • memory/4336-1129-0x00000000055B0000-0x00000000055C0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4336-1128-0x0000000005480000-0x00000000054CB000-memory.dmp

                      Filesize

                      300KB

                    • memory/4456-185-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-172-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-186-0x0000000000400000-0x0000000002B83000-memory.dmp

                      Filesize

                      39.5MB

                    • memory/4456-170-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-176-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-183-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-177-0x0000000007180000-0x0000000007190000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-180-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-181-0x0000000007180000-0x0000000007190000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-179-0x0000000007180000-0x0000000007190000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-174-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-164-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-162-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-160-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-188-0x0000000000400000-0x0000000002B83000-memory.dmp

                      Filesize

                      39.5MB

                    • memory/4456-168-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-166-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-158-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-156-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-155-0x0000000004B60000-0x0000000004B72000-memory.dmp

                      Filesize

                      72KB

                    • memory/4456-154-0x0000000004B60000-0x0000000004B78000-memory.dmp

                      Filesize

                      96KB

                    • memory/4456-153-0x0000000007190000-0x000000000768E000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/4456-152-0x00000000049C0000-0x00000000049DA000-memory.dmp

                      Filesize

                      104KB

                    • memory/4456-151-0x0000000002C60000-0x0000000002C8D000-memory.dmp

                      Filesize

                      180KB