Analysis

  • max time kernel
    125s
  • max time network
    127s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 02:00

General

  • Target

    53fe090a461ef49a2312340d595e2979309ebecfe0a2583acf75e66bd21a0cc5.exe

  • Size

    1004KB

  • MD5

    8c8f07dc04ceb483f34ec797b88960a3

  • SHA1

    ce2ab1fbef859b20b08f692636bb5f3e39eee143

  • SHA256

    53fe090a461ef49a2312340d595e2979309ebecfe0a2583acf75e66bd21a0cc5

  • SHA512

    f93f0c326aaeda469a78b4631c5d324e4d1a4650f5eb99c161857e46b9dfb909182ef72e125abf798139a2529ab739c66c701c1df90ac25e5c0741a5113928a4

  • SSDEEP

    24576:ayDa4PannDy90WAYeYAWMjE7na2h41xba3mJp06kagel4pQvs:hue0qe2MjEza2uxomjg0f

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53fe090a461ef49a2312340d595e2979309ebecfe0a2583acf75e66bd21a0cc5.exe
    "C:\Users\Admin\AppData\Local\Temp\53fe090a461ef49a2312340d595e2979309ebecfe0a2583acf75e66bd21a0cc5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2558.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2558.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4492.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4492.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5811.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5811.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2956
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu756940.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu756940.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3792
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7804.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7804.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dLV82s89.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dLV82s89.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en292797.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en292797.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3584
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge872120.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge872120.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3712
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:528
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4716
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:776
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4720
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3420
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4812
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4356
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4372
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4948
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4336

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                aecb41aa3af9f5cce9cefe900f5cb247

                SHA1

                1b0a48bfc957be7b748c4be6be436f1808cbdd00

                SHA256

                0573cc81c4b995e94741a152f106ea9aac2719b8d8d04e70c22d458b4b0749ef

                SHA512

                9d640f2b36e514a3609d0fa94911c6787993c9fe7c59ed32cf9aed046d6c20c9b1ab7d64a0cadd45cfd59da5e921b12334d14f364c49cffa4016e0d58a73ce3d

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                aecb41aa3af9f5cce9cefe900f5cb247

                SHA1

                1b0a48bfc957be7b748c4be6be436f1808cbdd00

                SHA256

                0573cc81c4b995e94741a152f106ea9aac2719b8d8d04e70c22d458b4b0749ef

                SHA512

                9d640f2b36e514a3609d0fa94911c6787993c9fe7c59ed32cf9aed046d6c20c9b1ab7d64a0cadd45cfd59da5e921b12334d14f364c49cffa4016e0d58a73ce3d

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                aecb41aa3af9f5cce9cefe900f5cb247

                SHA1

                1b0a48bfc957be7b748c4be6be436f1808cbdd00

                SHA256

                0573cc81c4b995e94741a152f106ea9aac2719b8d8d04e70c22d458b4b0749ef

                SHA512

                9d640f2b36e514a3609d0fa94911c6787993c9fe7c59ed32cf9aed046d6c20c9b1ab7d64a0cadd45cfd59da5e921b12334d14f364c49cffa4016e0d58a73ce3d

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                aecb41aa3af9f5cce9cefe900f5cb247

                SHA1

                1b0a48bfc957be7b748c4be6be436f1808cbdd00

                SHA256

                0573cc81c4b995e94741a152f106ea9aac2719b8d8d04e70c22d458b4b0749ef

                SHA512

                9d640f2b36e514a3609d0fa94911c6787993c9fe7c59ed32cf9aed046d6c20c9b1ab7d64a0cadd45cfd59da5e921b12334d14f364c49cffa4016e0d58a73ce3d

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                aecb41aa3af9f5cce9cefe900f5cb247

                SHA1

                1b0a48bfc957be7b748c4be6be436f1808cbdd00

                SHA256

                0573cc81c4b995e94741a152f106ea9aac2719b8d8d04e70c22d458b4b0749ef

                SHA512

                9d640f2b36e514a3609d0fa94911c6787993c9fe7c59ed32cf9aed046d6c20c9b1ab7d64a0cadd45cfd59da5e921b12334d14f364c49cffa4016e0d58a73ce3d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge872120.exe

                Filesize

                227KB

                MD5

                aecb41aa3af9f5cce9cefe900f5cb247

                SHA1

                1b0a48bfc957be7b748c4be6be436f1808cbdd00

                SHA256

                0573cc81c4b995e94741a152f106ea9aac2719b8d8d04e70c22d458b4b0749ef

                SHA512

                9d640f2b36e514a3609d0fa94911c6787993c9fe7c59ed32cf9aed046d6c20c9b1ab7d64a0cadd45cfd59da5e921b12334d14f364c49cffa4016e0d58a73ce3d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge872120.exe

                Filesize

                227KB

                MD5

                aecb41aa3af9f5cce9cefe900f5cb247

                SHA1

                1b0a48bfc957be7b748c4be6be436f1808cbdd00

                SHA256

                0573cc81c4b995e94741a152f106ea9aac2719b8d8d04e70c22d458b4b0749ef

                SHA512

                9d640f2b36e514a3609d0fa94911c6787993c9fe7c59ed32cf9aed046d6c20c9b1ab7d64a0cadd45cfd59da5e921b12334d14f364c49cffa4016e0d58a73ce3d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2558.exe

                Filesize

                822KB

                MD5

                350ddd5ddf2b19d05d9385b527943f95

                SHA1

                3e2c1a9bdddb1c93fd8c3386d31023a5471d8add

                SHA256

                3a1733d10873df5fc2fc02c658ac0d09b06d90a554ca5a24e709de1c0736214e

                SHA512

                041d995c994c09cb3efb673dba16cfb3237a9f678f133f0e82d98db1e01907d73b84db79607080b917259c3d185add936bb5171929ae3d6ece35e60e9a5611c6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2558.exe

                Filesize

                822KB

                MD5

                350ddd5ddf2b19d05d9385b527943f95

                SHA1

                3e2c1a9bdddb1c93fd8c3386d31023a5471d8add

                SHA256

                3a1733d10873df5fc2fc02c658ac0d09b06d90a554ca5a24e709de1c0736214e

                SHA512

                041d995c994c09cb3efb673dba16cfb3237a9f678f133f0e82d98db1e01907d73b84db79607080b917259c3d185add936bb5171929ae3d6ece35e60e9a5611c6

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en292797.exe

                Filesize

                175KB

                MD5

                efc7bec46d4f54b0b921549c4483fabe

                SHA1

                f86e83461b1a92f9b9ba80b2680565fa2dc81dc6

                SHA256

                1c986bd36d39918025ec8cb36f6d4ce31badf47f963fc285e192072fa4419675

                SHA512

                12cf0334c3362d66f2dff698643964026bd7dc89ced7facbd1f29d8821ba153535fb930db9fdbd48816e6eb8625459d993df76372c1aa4f22d5642ed62924ccc

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en292797.exe

                Filesize

                175KB

                MD5

                efc7bec46d4f54b0b921549c4483fabe

                SHA1

                f86e83461b1a92f9b9ba80b2680565fa2dc81dc6

                SHA256

                1c986bd36d39918025ec8cb36f6d4ce31badf47f963fc285e192072fa4419675

                SHA512

                12cf0334c3362d66f2dff698643964026bd7dc89ced7facbd1f29d8821ba153535fb930db9fdbd48816e6eb8625459d993df76372c1aa4f22d5642ed62924ccc

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4492.exe

                Filesize

                680KB

                MD5

                9a4275c767fba89939d8308a4258caf0

                SHA1

                dd4923d62aa27519b6be5aed8aab7cbdba126418

                SHA256

                558e441e4898d9bfc62982d135631aeb38c5762e31c6a1f385ead1f20238c61f

                SHA512

                fd8c8128d22149c87d71052c8eb89f8cfe14a6e31762fd86dbb0c47745214b4ae51a913ef7f057db00310d4b057b888b3c0bb0cb38d6032baf3c649500a9f86f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4492.exe

                Filesize

                680KB

                MD5

                9a4275c767fba89939d8308a4258caf0

                SHA1

                dd4923d62aa27519b6be5aed8aab7cbdba126418

                SHA256

                558e441e4898d9bfc62982d135631aeb38c5762e31c6a1f385ead1f20238c61f

                SHA512

                fd8c8128d22149c87d71052c8eb89f8cfe14a6e31762fd86dbb0c47745214b4ae51a913ef7f057db00310d4b057b888b3c0bb0cb38d6032baf3c649500a9f86f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dLV82s89.exe

                Filesize

                345KB

                MD5

                72e5d9fbacb044ec7d747ba3fe044014

                SHA1

                ab24e49698d253763e6d459de6c907c681fa5bb3

                SHA256

                adc7ce0eacf66c8ea64622f9400fd8b6e74b031f027371927766ac5d04ffb813

                SHA512

                fa3f4ef41f967154b9e3bca4e4f7b25de0db03cb55f356363fa58a350209ec5e09c3003bf2056430ffcd74d1589c639e97ce20751804d966685b0d44332d6d0d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dLV82s89.exe

                Filesize

                345KB

                MD5

                72e5d9fbacb044ec7d747ba3fe044014

                SHA1

                ab24e49698d253763e6d459de6c907c681fa5bb3

                SHA256

                adc7ce0eacf66c8ea64622f9400fd8b6e74b031f027371927766ac5d04ffb813

                SHA512

                fa3f4ef41f967154b9e3bca4e4f7b25de0db03cb55f356363fa58a350209ec5e09c3003bf2056430ffcd74d1589c639e97ce20751804d966685b0d44332d6d0d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5811.exe

                Filesize

                344KB

                MD5

                ccf83947f93f7d0c89a85b2f44f3ceec

                SHA1

                5ac55ee1b97656387be90457d1862f10973ed8cb

                SHA256

                0207dbbcf2b61fd932f86dcda065177bcc56bc84d8a5193bbc4c29b178bc52cf

                SHA512

                05543e9da57fc2ee0263fd4bb4b753fc3231deafbc2307ebfbced42798e1b168b1cd4a35d7f40475c03ce0fc3413cbac7e3b2e641ab841bc8e0660e73f639087

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5811.exe

                Filesize

                344KB

                MD5

                ccf83947f93f7d0c89a85b2f44f3ceec

                SHA1

                5ac55ee1b97656387be90457d1862f10973ed8cb

                SHA256

                0207dbbcf2b61fd932f86dcda065177bcc56bc84d8a5193bbc4c29b178bc52cf

                SHA512

                05543e9da57fc2ee0263fd4bb4b753fc3231deafbc2307ebfbced42798e1b168b1cd4a35d7f40475c03ce0fc3413cbac7e3b2e641ab841bc8e0660e73f639087

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu756940.exe

                Filesize

                11KB

                MD5

                f972a7ac085e6c32b6c52bd0cd379c57

                SHA1

                acc5aa28ded5e648f4693b0ce1ebcf7795fd21ec

                SHA256

                410bed8f20fedc3e27a5e6b6364d33a45a5d39792c5893af1087afdf9a975a87

                SHA512

                7fabfaf45072558fb6fab2630c78b05c9bc893a1962c4ddc1822cc65e2550336d7732acc97735399b61e2a783d8fdc451690c90a4c2186e914b155f88ba4b2cf

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu756940.exe

                Filesize

                11KB

                MD5

                f972a7ac085e6c32b6c52bd0cd379c57

                SHA1

                acc5aa28ded5e648f4693b0ce1ebcf7795fd21ec

                SHA256

                410bed8f20fedc3e27a5e6b6364d33a45a5d39792c5893af1087afdf9a975a87

                SHA512

                7fabfaf45072558fb6fab2630c78b05c9bc893a1962c4ddc1822cc65e2550336d7732acc97735399b61e2a783d8fdc451690c90a4c2186e914b155f88ba4b2cf

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7804.exe

                Filesize

                291KB

                MD5

                c779bc17763741eb8062b7c85dc1bed6

                SHA1

                6709cda8c276dca4ed95f51e46c5fc6cd78bbce2

                SHA256

                684d76c2fc8ea9df2e797aa4e6a383dbd91f887dfccf1646294c9a7620bc78f1

                SHA512

                c33b3ccc18384042aeb8b8b8259ce612d451149a5f626e9afe2deae5938452e8c800c2fee428b5b3d343ff5d53dea02a3c389de37a959bd869058eb7018e0106

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7804.exe

                Filesize

                291KB

                MD5

                c779bc17763741eb8062b7c85dc1bed6

                SHA1

                6709cda8c276dca4ed95f51e46c5fc6cd78bbce2

                SHA256

                684d76c2fc8ea9df2e797aa4e6a383dbd91f887dfccf1646294c9a7620bc78f1

                SHA512

                c33b3ccc18384042aeb8b8b8259ce612d451149a5f626e9afe2deae5938452e8c800c2fee428b5b3d343ff5d53dea02a3c389de37a959bd869058eb7018e0106

              • memory/3584-1134-0x00000000050A0000-0x00000000050B0000-memory.dmp

                Filesize

                64KB

              • memory/3584-1133-0x0000000004ED0000-0x0000000004F1B000-memory.dmp

                Filesize

                300KB

              • memory/3584-1132-0x0000000000470000-0x00000000004A2000-memory.dmp

                Filesize

                200KB

              • memory/3792-149-0x0000000000900000-0x000000000090A000-memory.dmp

                Filesize

                40KB

              • memory/4644-1114-0x0000000006D30000-0x0000000006D6E000-memory.dmp

                Filesize

                248KB

              • memory/4644-389-0x0000000001B00000-0x0000000001B4B000-memory.dmp

                Filesize

                300KB

              • memory/4644-1126-0x0000000008080000-0x00000000080D0000-memory.dmp

                Filesize

                320KB

              • memory/4644-1125-0x0000000008000000-0x0000000008076000-memory.dmp

                Filesize

                472KB

              • memory/4644-1124-0x0000000007990000-0x0000000007EBC000-memory.dmp

                Filesize

                5.2MB

              • memory/4644-1123-0x00000000077C0000-0x0000000007982000-memory.dmp

                Filesize

                1.8MB

              • memory/4644-1122-0x00000000038B0000-0x00000000038C0000-memory.dmp

                Filesize

                64KB

              • memory/4644-1121-0x00000000076D0000-0x0000000007762000-memory.dmp

                Filesize

                584KB

              • memory/4644-1120-0x00000000038B0000-0x00000000038C0000-memory.dmp

                Filesize

                64KB

              • memory/4644-1119-0x00000000038B0000-0x00000000038C0000-memory.dmp

                Filesize

                64KB

              • memory/4644-1118-0x00000000038B0000-0x00000000038C0000-memory.dmp

                Filesize

                64KB

              • memory/4644-1117-0x0000000007010000-0x0000000007076000-memory.dmp

                Filesize

                408KB

              • memory/4644-1115-0x0000000006E80000-0x0000000006ECB000-memory.dmp

                Filesize

                300KB

              • memory/4644-198-0x00000000038C0000-0x0000000003906000-memory.dmp

                Filesize

                280KB

              • memory/4644-199-0x00000000064D0000-0x0000000006514000-memory.dmp

                Filesize

                272KB

              • memory/4644-200-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-201-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-203-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-205-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-207-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-209-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-211-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-213-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-215-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-217-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-219-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-221-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-223-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-225-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-227-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-229-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-231-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-233-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4644-1113-0x00000000038B0000-0x00000000038C0000-memory.dmp

                Filesize

                64KB

              • memory/4644-391-0x00000000038B0000-0x00000000038C0000-memory.dmp

                Filesize

                64KB

              • memory/4644-395-0x00000000038B0000-0x00000000038C0000-memory.dmp

                Filesize

                64KB

              • memory/4644-393-0x00000000038B0000-0x00000000038C0000-memory.dmp

                Filesize

                64KB

              • memory/4644-1110-0x0000000006540000-0x0000000006B46000-memory.dmp

                Filesize

                6.0MB

              • memory/4644-1111-0x0000000006BD0000-0x0000000006CDA000-memory.dmp

                Filesize

                1.0MB

              • memory/4644-1112-0x0000000006D10000-0x0000000006D22000-memory.dmp

                Filesize

                72KB

              • memory/5116-181-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-193-0x0000000000400000-0x000000000070B000-memory.dmp

                Filesize

                3.0MB

              • memory/5116-179-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-177-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-171-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-191-0x0000000002660000-0x0000000002670000-memory.dmp

                Filesize

                64KB

              • memory/5116-190-0x0000000000400000-0x000000000070B000-memory.dmp

                Filesize

                3.0MB

              • memory/5116-169-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-188-0x0000000002660000-0x0000000002670000-memory.dmp

                Filesize

                64KB

              • memory/5116-187-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-185-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-183-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-175-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-173-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-189-0x0000000002660000-0x0000000002670000-memory.dmp

                Filesize

                64KB

              • memory/5116-167-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-165-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-163-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-161-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-160-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/5116-159-0x0000000005170000-0x0000000005188000-memory.dmp

                Filesize

                96KB

              • memory/5116-158-0x0000000004C70000-0x000000000516E000-memory.dmp

                Filesize

                5.0MB

              • memory/5116-157-0x0000000002660000-0x0000000002670000-memory.dmp

                Filesize

                64KB

              • memory/5116-156-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/5116-155-0x00000000024C0000-0x00000000024DA000-memory.dmp

                Filesize

                104KB