Analysis

  • max time kernel
    126s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:33

General

  • Target

    35984772051be6bcb95f93e5df8cbd243074e68d364db91440da706406dd6ee4.exe

  • Size

    1017KB

  • MD5

    5ebb78447e0c5f9d763a4821dcc6953d

  • SHA1

    d90fd2730485c3bab65f2ba7f81e54502ec05642

  • SHA256

    35984772051be6bcb95f93e5df8cbd243074e68d364db91440da706406dd6ee4

  • SHA512

    a73b320803fe3f9883228cec179759fcc00756d9dea505c7ac9512960796cb47f8f85ff48ffd05cdc05f3cce62f72bcd4bb7fd09d4a644087b02a20d58198b98

  • SSDEEP

    24576:jyStLh1bmTlhtE87LS01YInuDXx0sD1tQbgDyXi26g:2StLDOhtdPOInuGsfDy

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

reiv

C2

193.233.20.33:4125

Attributes
  • auth_value

    5e0113277ad2cf97a9b7e175007f1c55

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35984772051be6bcb95f93e5df8cbd243074e68d364db91440da706406dd6ee4.exe
    "C:\Users\Admin\AppData\Local\Temp\35984772051be6bcb95f93e5df8cbd243074e68d364db91440da706406dd6ee4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9561.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9561.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1649.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1649.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1304.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1304.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2532
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu097945.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu097945.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3256
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6542.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6542.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1540
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dow87s67.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dow87s67.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en423984.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en423984.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge278027.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge278027.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3204
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3968
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2064
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3264
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:1268
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:2604
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2280
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4816
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4152
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:2796
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4108

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                7f6042a511c8809a2bcac70e47de7341

                SHA1

                b8fc6c581a812e81f2d35ea6fc21e7c0f0812f39

                SHA256

                46183001b5ed02ad455661aa6add45b3bbaff895b54598d51d954d891bcb7cb9

                SHA512

                c0e19cd1f86c184f19f6258835361e6af59443190b0481db4e232a135e8a5e5184e7860dc12ab7fadc8b338c378a0284e48c0cc25966f959b51834ca1771a496

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                7f6042a511c8809a2bcac70e47de7341

                SHA1

                b8fc6c581a812e81f2d35ea6fc21e7c0f0812f39

                SHA256

                46183001b5ed02ad455661aa6add45b3bbaff895b54598d51d954d891bcb7cb9

                SHA512

                c0e19cd1f86c184f19f6258835361e6af59443190b0481db4e232a135e8a5e5184e7860dc12ab7fadc8b338c378a0284e48c0cc25966f959b51834ca1771a496

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                7f6042a511c8809a2bcac70e47de7341

                SHA1

                b8fc6c581a812e81f2d35ea6fc21e7c0f0812f39

                SHA256

                46183001b5ed02ad455661aa6add45b3bbaff895b54598d51d954d891bcb7cb9

                SHA512

                c0e19cd1f86c184f19f6258835361e6af59443190b0481db4e232a135e8a5e5184e7860dc12ab7fadc8b338c378a0284e48c0cc25966f959b51834ca1771a496

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                7f6042a511c8809a2bcac70e47de7341

                SHA1

                b8fc6c581a812e81f2d35ea6fc21e7c0f0812f39

                SHA256

                46183001b5ed02ad455661aa6add45b3bbaff895b54598d51d954d891bcb7cb9

                SHA512

                c0e19cd1f86c184f19f6258835361e6af59443190b0481db4e232a135e8a5e5184e7860dc12ab7fadc8b338c378a0284e48c0cc25966f959b51834ca1771a496

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                7f6042a511c8809a2bcac70e47de7341

                SHA1

                b8fc6c581a812e81f2d35ea6fc21e7c0f0812f39

                SHA256

                46183001b5ed02ad455661aa6add45b3bbaff895b54598d51d954d891bcb7cb9

                SHA512

                c0e19cd1f86c184f19f6258835361e6af59443190b0481db4e232a135e8a5e5184e7860dc12ab7fadc8b338c378a0284e48c0cc25966f959b51834ca1771a496

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge278027.exe

                Filesize

                227KB

                MD5

                7f6042a511c8809a2bcac70e47de7341

                SHA1

                b8fc6c581a812e81f2d35ea6fc21e7c0f0812f39

                SHA256

                46183001b5ed02ad455661aa6add45b3bbaff895b54598d51d954d891bcb7cb9

                SHA512

                c0e19cd1f86c184f19f6258835361e6af59443190b0481db4e232a135e8a5e5184e7860dc12ab7fadc8b338c378a0284e48c0cc25966f959b51834ca1771a496

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge278027.exe

                Filesize

                227KB

                MD5

                7f6042a511c8809a2bcac70e47de7341

                SHA1

                b8fc6c581a812e81f2d35ea6fc21e7c0f0812f39

                SHA256

                46183001b5ed02ad455661aa6add45b3bbaff895b54598d51d954d891bcb7cb9

                SHA512

                c0e19cd1f86c184f19f6258835361e6af59443190b0481db4e232a135e8a5e5184e7860dc12ab7fadc8b338c378a0284e48c0cc25966f959b51834ca1771a496

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9561.exe

                Filesize

                842KB

                MD5

                99110f1b4e7ca938d5667068011bbd2d

                SHA1

                2ca0cabb61f06828f514d0437a8e3c0b6557c65a

                SHA256

                0b0755dd33c92a1874279cf344cf73773e9d15246a46679620d3c413c3986e3f

                SHA512

                1ef1d8a6e244bb4ba9d12a942af38efe1a2c7ae84768a447ed7b0cbcc2802c28bc2d92f973f012be533be992e492f41d698f80ed2623fdf00217d609e5fc6884

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9561.exe

                Filesize

                842KB

                MD5

                99110f1b4e7ca938d5667068011bbd2d

                SHA1

                2ca0cabb61f06828f514d0437a8e3c0b6557c65a

                SHA256

                0b0755dd33c92a1874279cf344cf73773e9d15246a46679620d3c413c3986e3f

                SHA512

                1ef1d8a6e244bb4ba9d12a942af38efe1a2c7ae84768a447ed7b0cbcc2802c28bc2d92f973f012be533be992e492f41d698f80ed2623fdf00217d609e5fc6884

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en423984.exe

                Filesize

                175KB

                MD5

                88ba187c86f1b77979e7e55402453063

                SHA1

                007aec8ebe5159362ac6d5367a4207eed884fe8b

                SHA256

                84eb8d272143f67822d219479ccd951e9c879f30908b0b34e80d5ca5bdcb1730

                SHA512

                3c65d115d8fe892dd70a68936fcaea9b962a5954977428e8d1b8d127707e6053eac3bad9f2465566150fe889437bd452a90f5ac48aa592cf8783ac30a5b3a539

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en423984.exe

                Filesize

                175KB

                MD5

                88ba187c86f1b77979e7e55402453063

                SHA1

                007aec8ebe5159362ac6d5367a4207eed884fe8b

                SHA256

                84eb8d272143f67822d219479ccd951e9c879f30908b0b34e80d5ca5bdcb1730

                SHA512

                3c65d115d8fe892dd70a68936fcaea9b962a5954977428e8d1b8d127707e6053eac3bad9f2465566150fe889437bd452a90f5ac48aa592cf8783ac30a5b3a539

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1649.exe

                Filesize

                699KB

                MD5

                38398d0311eeb1e550cd6a49b59682cb

                SHA1

                d35c213ac4ee961d9918ba568e2f9d9d86a39ff4

                SHA256

                104a466df75580ce0e96e7368d2e6a146a71b9612f17c63941bbf86ae1feac6e

                SHA512

                9fa3df273ac4d742c5db3ef4cc67de79749220aba966a610444b47ea4651c9e937b42a8acbac5c38b3f55b08803f1df0015632f0e22765b9b5d5c9bb7752e87b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1649.exe

                Filesize

                699KB

                MD5

                38398d0311eeb1e550cd6a49b59682cb

                SHA1

                d35c213ac4ee961d9918ba568e2f9d9d86a39ff4

                SHA256

                104a466df75580ce0e96e7368d2e6a146a71b9612f17c63941bbf86ae1feac6e

                SHA512

                9fa3df273ac4d742c5db3ef4cc67de79749220aba966a610444b47ea4651c9e937b42a8acbac5c38b3f55b08803f1df0015632f0e22765b9b5d5c9bb7752e87b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dow87s67.exe

                Filesize

                359KB

                MD5

                5728a1a10495a0492649ba1544faf27d

                SHA1

                b8c1b6127b83b9b3a239a2c956b8fcab10653eb4

                SHA256

                dfa498e580f871cfaa2f788bf50a8fec170eb9669c96e263c3a431ce7c5f3a53

                SHA512

                f437aefabd3877e79e85434d808fb876441c5d42fcead9a08cfb4aa16b2947d6db7eab32086ab8d16e5bb24566aa9abd4501727e0db36c86b702743a25f131fb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dow87s67.exe

                Filesize

                359KB

                MD5

                5728a1a10495a0492649ba1544faf27d

                SHA1

                b8c1b6127b83b9b3a239a2c956b8fcab10653eb4

                SHA256

                dfa498e580f871cfaa2f788bf50a8fec170eb9669c96e263c3a431ce7c5f3a53

                SHA512

                f437aefabd3877e79e85434d808fb876441c5d42fcead9a08cfb4aa16b2947d6db7eab32086ab8d16e5bb24566aa9abd4501727e0db36c86b702743a25f131fb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1304.exe

                Filesize

                346KB

                MD5

                d4766512d3fdcfd38cf404e9158cc338

                SHA1

                52bd80d42bfe81829cdba1b0dc4d8ef05875cd29

                SHA256

                3a727125b74408f3b765fdf477f10d5ce8ae511c7020bc57e00e97cf78e9a693

                SHA512

                a0bfdc3fffae619d16c996993d567a050ab08e05cb6c522e9a92a38f4cdc6e8c717c0b2b5f2af1cac0b5bcfd6cac20469541bfd2fca4b764b23bd084ac1ba9be

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1304.exe

                Filesize

                346KB

                MD5

                d4766512d3fdcfd38cf404e9158cc338

                SHA1

                52bd80d42bfe81829cdba1b0dc4d8ef05875cd29

                SHA256

                3a727125b74408f3b765fdf477f10d5ce8ae511c7020bc57e00e97cf78e9a693

                SHA512

                a0bfdc3fffae619d16c996993d567a050ab08e05cb6c522e9a92a38f4cdc6e8c717c0b2b5f2af1cac0b5bcfd6cac20469541bfd2fca4b764b23bd084ac1ba9be

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu097945.exe

                Filesize

                12KB

                MD5

                91498d3df3e8bd196d16dbc6747063a3

                SHA1

                f2be7fa1a7df3278d26c7fd86a60885a7ff65a44

                SHA256

                e5258bd13e314da88faa6ad31eab6364bff80e65cacda99246a3549ff1d3b2e2

                SHA512

                c02f31528c71c6e7d4c2a5175f68be9d5a6f1b73a6392f1515e1b6902391f9670565ad0c446e69379b2b450d03da1b0d34220257348610466c7e319ad6f9436a

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu097945.exe

                Filesize

                12KB

                MD5

                91498d3df3e8bd196d16dbc6747063a3

                SHA1

                f2be7fa1a7df3278d26c7fd86a60885a7ff65a44

                SHA256

                e5258bd13e314da88faa6ad31eab6364bff80e65cacda99246a3549ff1d3b2e2

                SHA512

                c02f31528c71c6e7d4c2a5175f68be9d5a6f1b73a6392f1515e1b6902391f9670565ad0c446e69379b2b450d03da1b0d34220257348610466c7e319ad6f9436a

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6542.exe

                Filesize

                300KB

                MD5

                efdf4f144c65ecdcc8f46903e3a902ef

                SHA1

                38228258d6606b1f77f3b8b0aa4e23fa8be8789f

                SHA256

                e19e461a1bf5d11cf975f7bd600ef3ddecb63054f100c9d805dfea86c3830504

                SHA512

                e57fa62f30f1228149d1aa1d54d0a3337dc8aeb72740ee0dd65335e2ebd459c5ff71d6befae916ed70b096ac0a6835efcd211f1aa1b8c816528cc133835c4bdf

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6542.exe

                Filesize

                300KB

                MD5

                efdf4f144c65ecdcc8f46903e3a902ef

                SHA1

                38228258d6606b1f77f3b8b0aa4e23fa8be8789f

                SHA256

                e19e461a1bf5d11cf975f7bd600ef3ddecb63054f100c9d805dfea86c3830504

                SHA512

                e57fa62f30f1228149d1aa1d54d0a3337dc8aeb72740ee0dd65335e2ebd459c5ff71d6befae916ed70b096ac0a6835efcd211f1aa1b8c816528cc133835c4bdf

              • memory/1540-181-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-200-0x0000000000400000-0x000000000070E000-memory.dmp

                Filesize

                3.1MB

              • memory/1540-179-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-167-0x0000000004D70000-0x0000000005314000-memory.dmp

                Filesize

                5.6MB

              • memory/1540-183-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-185-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-187-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-189-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-191-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-193-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-195-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-197-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-199-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-177-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-202-0x00000000029D0000-0x00000000029E0000-memory.dmp

                Filesize

                64KB

              • memory/1540-203-0x00000000029D0000-0x00000000029E0000-memory.dmp

                Filesize

                64KB

              • memory/1540-201-0x00000000029D0000-0x00000000029E0000-memory.dmp

                Filesize

                64KB

              • memory/1540-205-0x0000000000400000-0x000000000070E000-memory.dmp

                Filesize

                3.1MB

              • memory/1540-168-0x0000000000870000-0x000000000089D000-memory.dmp

                Filesize

                180KB

              • memory/1540-172-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-175-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-173-0x0000000002810000-0x0000000002822000-memory.dmp

                Filesize

                72KB

              • memory/1540-171-0x00000000029D0000-0x00000000029E0000-memory.dmp

                Filesize

                64KB

              • memory/1540-170-0x00000000029D0000-0x00000000029E0000-memory.dmp

                Filesize

                64KB

              • memory/1540-169-0x00000000029D0000-0x00000000029E0000-memory.dmp

                Filesize

                64KB

              • memory/2392-1141-0x00000000000E0000-0x0000000000112000-memory.dmp

                Filesize

                200KB

              • memory/2392-1142-0x00000000049E0000-0x00000000049F0000-memory.dmp

                Filesize

                64KB

              • memory/3256-161-0x00000000004C0000-0x00000000004CA000-memory.dmp

                Filesize

                40KB

              • memory/3868-211-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-225-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-227-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-229-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-233-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-231-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-235-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-237-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-239-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-241-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-243-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-245-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-247-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-1120-0x00000000054B0000-0x0000000005AC8000-memory.dmp

                Filesize

                6.1MB

              • memory/3868-1121-0x0000000005B00000-0x0000000005C0A000-memory.dmp

                Filesize

                1.0MB

              • memory/3868-1122-0x0000000005C40000-0x0000000005C52000-memory.dmp

                Filesize

                72KB

              • memory/3868-1123-0x0000000005C60000-0x0000000005C9C000-memory.dmp

                Filesize

                240KB

              • memory/3868-1124-0x0000000002690000-0x00000000026A0000-memory.dmp

                Filesize

                64KB

              • memory/3868-1126-0x0000000002690000-0x00000000026A0000-memory.dmp

                Filesize

                64KB

              • memory/3868-1127-0x0000000002690000-0x00000000026A0000-memory.dmp

                Filesize

                64KB

              • memory/3868-1128-0x0000000002690000-0x00000000026A0000-memory.dmp

                Filesize

                64KB

              • memory/3868-1129-0x0000000005F50000-0x0000000005FE2000-memory.dmp

                Filesize

                584KB

              • memory/3868-1130-0x0000000005FF0000-0x0000000006056000-memory.dmp

                Filesize

                408KB

              • memory/3868-1131-0x0000000006850000-0x0000000006A12000-memory.dmp

                Filesize

                1.8MB

              • memory/3868-1132-0x0000000006A30000-0x0000000006F5C000-memory.dmp

                Filesize

                5.2MB

              • memory/3868-1133-0x0000000002690000-0x00000000026A0000-memory.dmp

                Filesize

                64KB

              • memory/3868-223-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-212-0x0000000002690000-0x00000000026A0000-memory.dmp

                Filesize

                64KB

              • memory/3868-221-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-215-0x0000000002690000-0x00000000026A0000-memory.dmp

                Filesize

                64KB

              • memory/3868-219-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-217-0x0000000002690000-0x00000000026A0000-memory.dmp

                Filesize

                64KB

              • memory/3868-216-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-213-0x0000000002710000-0x000000000274E000-memory.dmp

                Filesize

                248KB

              • memory/3868-210-0x0000000002380000-0x00000000023CB000-memory.dmp

                Filesize

                300KB

              • memory/3868-1134-0x00000000074F0000-0x0000000007566000-memory.dmp

                Filesize

                472KB

              • memory/3868-1135-0x0000000007570000-0x00000000075C0000-memory.dmp

                Filesize

                320KB