Analysis

  • max time kernel
    147s
  • max time network
    124s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 03:27

General

  • Target

    78031c2c942873e2861368be982040620f8efa70827e547aca028ab8a642fb18.exe

  • Size

    1005KB

  • MD5

    93aac18b6e6ffc67fe291ea83931f263

  • SHA1

    6a4a453913b32618867e9da9cb3388853d458252

  • SHA256

    78031c2c942873e2861368be982040620f8efa70827e547aca028ab8a642fb18

  • SHA512

    56e5cb779d360887c4a252b7c8b9fb2ab0e293b4b3848583c27586b54dee2447793a779de52c4b3a5a4070141f3eabe69615d8e3f7059810bc8f61881e1da876

  • SSDEEP

    24576:MydXqtKPl6ROooNfrM5WFQFIaPsI5sMPA01L0u0agCSPChhXH:7dXjl6R3oNzjQaaFPA6TQTPW

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78031c2c942873e2861368be982040620f8efa70827e547aca028ab8a642fb18.exe
    "C:\Users\Admin\AppData\Local\Temp\78031c2c942873e2861368be982040620f8efa70827e547aca028ab8a642fb18.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7391.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7391.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1584.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1584.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1344.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1344.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3176
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu487953.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu487953.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4928
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1363.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1363.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3020
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVE20s90.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVE20s90.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4784
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en071946.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en071946.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258044.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258044.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3332
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3388
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4388
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4416
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5008
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4264
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4272
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:980
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:3296
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:5036
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4224
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4144

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                97bdcacc3821fd459e6457f7a2a087a8

                SHA1

                28f71578418a34e296c20538691a78f9d1831946

                SHA256

                fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                SHA512

                faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                97bdcacc3821fd459e6457f7a2a087a8

                SHA1

                28f71578418a34e296c20538691a78f9d1831946

                SHA256

                fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                SHA512

                faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                97bdcacc3821fd459e6457f7a2a087a8

                SHA1

                28f71578418a34e296c20538691a78f9d1831946

                SHA256

                fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                SHA512

                faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                97bdcacc3821fd459e6457f7a2a087a8

                SHA1

                28f71578418a34e296c20538691a78f9d1831946

                SHA256

                fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                SHA512

                faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                97bdcacc3821fd459e6457f7a2a087a8

                SHA1

                28f71578418a34e296c20538691a78f9d1831946

                SHA256

                fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                SHA512

                faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258044.exe

                Filesize

                227KB

                MD5

                97bdcacc3821fd459e6457f7a2a087a8

                SHA1

                28f71578418a34e296c20538691a78f9d1831946

                SHA256

                fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                SHA512

                faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258044.exe

                Filesize

                227KB

                MD5

                97bdcacc3821fd459e6457f7a2a087a8

                SHA1

                28f71578418a34e296c20538691a78f9d1831946

                SHA256

                fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                SHA512

                faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7391.exe

                Filesize

                823KB

                MD5

                26e17f3a8978f0b4e5fed6f1b8eefedf

                SHA1

                8f106beb62fc23fc840a8a2fec8465d095c85066

                SHA256

                f9e5a96484285d8cfb05fac286d69bd106ead9aa48a62fe8b1bfbdd02ddc85c3

                SHA512

                b9df83ae2ee48e6836886641a3964e0bfa6e1ad6c83690967555d74cc05b0d46c9296d49b805e31c32066a801b6d0a74c2c5105f5a951b56239239e85417ef82

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7391.exe

                Filesize

                823KB

                MD5

                26e17f3a8978f0b4e5fed6f1b8eefedf

                SHA1

                8f106beb62fc23fc840a8a2fec8465d095c85066

                SHA256

                f9e5a96484285d8cfb05fac286d69bd106ead9aa48a62fe8b1bfbdd02ddc85c3

                SHA512

                b9df83ae2ee48e6836886641a3964e0bfa6e1ad6c83690967555d74cc05b0d46c9296d49b805e31c32066a801b6d0a74c2c5105f5a951b56239239e85417ef82

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en071946.exe

                Filesize

                175KB

                MD5

                2dc393e4c6f80a19fe01d610974f9d1b

                SHA1

                d6f4798025f62b0134c82c01745e3a5f7dba3f70

                SHA256

                a1063cf62e34e4fa89f85ed64ff74967026c5f1a9f6370dc6d7a15045f38afc6

                SHA512

                d5c273c5d4d0bba2a8bd067c25e40ec6e0ce11badac9bb1bdb92f58402352a9de651a0e92d203ae76f7382696bb68eb32d2b4fee8be61a921f7b4b0bde676a3d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en071946.exe

                Filesize

                175KB

                MD5

                2dc393e4c6f80a19fe01d610974f9d1b

                SHA1

                d6f4798025f62b0134c82c01745e3a5f7dba3f70

                SHA256

                a1063cf62e34e4fa89f85ed64ff74967026c5f1a9f6370dc6d7a15045f38afc6

                SHA512

                d5c273c5d4d0bba2a8bd067c25e40ec6e0ce11badac9bb1bdb92f58402352a9de651a0e92d203ae76f7382696bb68eb32d2b4fee8be61a921f7b4b0bde676a3d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1584.exe

                Filesize

                680KB

                MD5

                14b54bb65d518d91cf3bb40d53d937fb

                SHA1

                ad88f1f76e0b4d4da7a824572915653e603f2516

                SHA256

                ed389a7be41cc3f4907fea284af9b373d14be47f55d2755efe55fc3cb4a4a66e

                SHA512

                d4c9693804be3fb36900e4b522974e44d9ae81d0d6edfd558d412f03067ac15506da94c4b2254910f8ebacc4b1c88892da5da923701cd172b841a23d283d6a1f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1584.exe

                Filesize

                680KB

                MD5

                14b54bb65d518d91cf3bb40d53d937fb

                SHA1

                ad88f1f76e0b4d4da7a824572915653e603f2516

                SHA256

                ed389a7be41cc3f4907fea284af9b373d14be47f55d2755efe55fc3cb4a4a66e

                SHA512

                d4c9693804be3fb36900e4b522974e44d9ae81d0d6edfd558d412f03067ac15506da94c4b2254910f8ebacc4b1c88892da5da923701cd172b841a23d283d6a1f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVE20s90.exe

                Filesize

                345KB

                MD5

                814af8c0794b811be356a17f5d39895e

                SHA1

                9d03734b888d9a3863dc64ab1d016fbb66a0e3eb

                SHA256

                0b94a0ddbcca4e4074109790abb50dbe42fffa647880dfd7942dd0790e44e4b7

                SHA512

                61625d0bdd285091f7c0868aa80d516c251f7dc02221da1146cd83757a46e6e464a9c8eeb508aad3c8aaedeced673f2b0b7b9aa2b1140799d9a588b386f08088

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVE20s90.exe

                Filesize

                345KB

                MD5

                814af8c0794b811be356a17f5d39895e

                SHA1

                9d03734b888d9a3863dc64ab1d016fbb66a0e3eb

                SHA256

                0b94a0ddbcca4e4074109790abb50dbe42fffa647880dfd7942dd0790e44e4b7

                SHA512

                61625d0bdd285091f7c0868aa80d516c251f7dc02221da1146cd83757a46e6e464a9c8eeb508aad3c8aaedeced673f2b0b7b9aa2b1140799d9a588b386f08088

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1344.exe

                Filesize

                344KB

                MD5

                f546c4389a032b2dd2febb12df1c1ca6

                SHA1

                96665e593f6fd6f13af0020a86b2d32a179be9ee

                SHA256

                f4eee7b851d88a2b0b359996cb76531700c8ecbb1aa4d6cfdefb3c552d72081b

                SHA512

                cc533474958d02b8ea300859a5b5de013d1ed5dfa862dc5b8146e3e305b9c6a591780e68271af4e65bca9a0cbd8ad57ba2ca88d9db32b39a2414c61f7395e35c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1344.exe

                Filesize

                344KB

                MD5

                f546c4389a032b2dd2febb12df1c1ca6

                SHA1

                96665e593f6fd6f13af0020a86b2d32a179be9ee

                SHA256

                f4eee7b851d88a2b0b359996cb76531700c8ecbb1aa4d6cfdefb3c552d72081b

                SHA512

                cc533474958d02b8ea300859a5b5de013d1ed5dfa862dc5b8146e3e305b9c6a591780e68271af4e65bca9a0cbd8ad57ba2ca88d9db32b39a2414c61f7395e35c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu487953.exe

                Filesize

                11KB

                MD5

                82b98158665b1bfe11dc9be36127a2f2

                SHA1

                e9b403d593ce88625a1d2d7400d05a1e68a7bff9

                SHA256

                86a5ad70791b6ab7415847566400a8421a03d7afddb4480d0ef91abb9756aae9

                SHA512

                5deb2dd57bbc77d09f84a45376f55f80545e07bb759afe7d9d3aef72049de96ea718a0294830ff960c19f11a51233eadb41e2210c1e36237647e2a7938719285

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu487953.exe

                Filesize

                11KB

                MD5

                82b98158665b1bfe11dc9be36127a2f2

                SHA1

                e9b403d593ce88625a1d2d7400d05a1e68a7bff9

                SHA256

                86a5ad70791b6ab7415847566400a8421a03d7afddb4480d0ef91abb9756aae9

                SHA512

                5deb2dd57bbc77d09f84a45376f55f80545e07bb759afe7d9d3aef72049de96ea718a0294830ff960c19f11a51233eadb41e2210c1e36237647e2a7938719285

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1363.exe

                Filesize

                291KB

                MD5

                74ef7e79db171f8336a407dbcf60f9f6

                SHA1

                ce6300a0630e0e46e078ce87795b136eff059d0e

                SHA256

                f84c0fab7dba87ba382f1fd5ad75ec378cf62cef4312f6344153e280c247d33c

                SHA512

                882993c12d815ba63f6c83f659bccb06b31259acd4c6bbb3f24adc2b1061cc95f15e156f30860fca2d9ba8edccf4ce5c5cdd21583f19e2583c5522adc6f7d03c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1363.exe

                Filesize

                291KB

                MD5

                74ef7e79db171f8336a407dbcf60f9f6

                SHA1

                ce6300a0630e0e46e078ce87795b136eff059d0e

                SHA256

                f84c0fab7dba87ba382f1fd5ad75ec378cf62cef4312f6344153e280c247d33c

                SHA512

                882993c12d815ba63f6c83f659bccb06b31259acd4c6bbb3f24adc2b1061cc95f15e156f30860fca2d9ba8edccf4ce5c5cdd21583f19e2583c5522adc6f7d03c

              • memory/3020-170-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-188-0x0000000000C40000-0x0000000000C50000-memory.dmp

                Filesize

                64KB

              • memory/3020-168-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-155-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/3020-172-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-174-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-176-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-178-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-180-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-182-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-184-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-186-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-187-0x0000000000C40000-0x0000000000C50000-memory.dmp

                Filesize

                64KB

              • memory/3020-166-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-189-0x0000000000C40000-0x0000000000C50000-memory.dmp

                Filesize

                64KB

              • memory/3020-190-0x0000000000400000-0x000000000070B000-memory.dmp

                Filesize

                3.0MB

              • memory/3020-192-0x0000000000400000-0x000000000070B000-memory.dmp

                Filesize

                3.0MB

              • memory/3020-164-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-160-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-162-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-159-0x0000000002330000-0x0000000002342000-memory.dmp

                Filesize

                72KB

              • memory/3020-158-0x0000000002330000-0x0000000002348000-memory.dmp

                Filesize

                96KB

              • memory/3020-157-0x0000000004D20000-0x000000000521E000-memory.dmp

                Filesize

                5.0MB

              • memory/3020-156-0x0000000002270000-0x000000000228A000-memory.dmp

                Filesize

                104KB

              • memory/4596-1131-0x0000000000DE0000-0x0000000000E12000-memory.dmp

                Filesize

                200KB

              • memory/4596-1133-0x0000000005630000-0x0000000005640000-memory.dmp

                Filesize

                64KB

              • memory/4596-1132-0x0000000005820000-0x000000000586B000-memory.dmp

                Filesize

                300KB

              • memory/4784-203-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-212-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-214-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-216-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-218-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-220-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-222-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-224-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-226-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-228-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-230-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-232-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-234-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-236-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-1109-0x0000000006540000-0x0000000006B46000-memory.dmp

                Filesize

                6.0MB

              • memory/4784-1110-0x0000000006BD0000-0x0000000006CDA000-memory.dmp

                Filesize

                1.0MB

              • memory/4784-1111-0x0000000006D10000-0x0000000006D22000-memory.dmp

                Filesize

                72KB

              • memory/4784-1112-0x0000000006D30000-0x0000000006D6E000-memory.dmp

                Filesize

                248KB

              • memory/4784-1113-0x0000000006E80000-0x0000000006ECB000-memory.dmp

                Filesize

                300KB

              • memory/4784-1114-0x0000000005FC0000-0x0000000005FD0000-memory.dmp

                Filesize

                64KB

              • memory/4784-1116-0x0000000007010000-0x00000000070A2000-memory.dmp

                Filesize

                584KB

              • memory/4784-1117-0x00000000070B0000-0x0000000007116000-memory.dmp

                Filesize

                408KB

              • memory/4784-1118-0x0000000005FC0000-0x0000000005FD0000-memory.dmp

                Filesize

                64KB

              • memory/4784-1119-0x0000000005FC0000-0x0000000005FD0000-memory.dmp

                Filesize

                64KB

              • memory/4784-1120-0x0000000005FC0000-0x0000000005FD0000-memory.dmp

                Filesize

                64KB

              • memory/4784-1121-0x00000000078A0000-0x0000000007916000-memory.dmp

                Filesize

                472KB

              • memory/4784-1122-0x0000000007920000-0x0000000007970000-memory.dmp

                Filesize

                320KB

              • memory/4784-1123-0x0000000008DA0000-0x0000000008F62000-memory.dmp

                Filesize

                1.8MB

              • memory/4784-210-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-208-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-204-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-206-0x00000000064D0000-0x000000000650F000-memory.dmp

                Filesize

                252KB

              • memory/4784-198-0x00000000064D0000-0x0000000006514000-memory.dmp

                Filesize

                272KB

              • memory/4784-202-0x0000000005FC0000-0x0000000005FD0000-memory.dmp

                Filesize

                64KB

              • memory/4784-201-0x0000000005FC0000-0x0000000005FD0000-memory.dmp

                Filesize

                64KB

              • memory/4784-200-0x0000000005FC0000-0x0000000005FD0000-memory.dmp

                Filesize

                64KB

              • memory/4784-199-0x0000000001B00000-0x0000000001B4B000-memory.dmp

                Filesize

                300KB

              • memory/4784-197-0x0000000005E00000-0x0000000005E46000-memory.dmp

                Filesize

                280KB

              • memory/4784-1124-0x0000000008F70000-0x000000000949C000-memory.dmp

                Filesize

                5.2MB

              • memory/4784-1125-0x0000000005FC0000-0x0000000005FD0000-memory.dmp

                Filesize

                64KB

              • memory/4928-149-0x0000000000120000-0x000000000012A000-memory.dmp

                Filesize

                40KB