Analysis

  • max time kernel
    119s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 04:21

General

  • Target

    048700b2d255350f6973630bd02c5a53719ea46d4ced02c507e4605b2c56f7a1.exe

  • Size

    1004KB

  • MD5

    9bf4aab7d832a86a6854d8267efb0340

  • SHA1

    63bd259c5c69d1689259193e974195b41f80c51d

  • SHA256

    048700b2d255350f6973630bd02c5a53719ea46d4ced02c507e4605b2c56f7a1

  • SHA512

    1148b1fc7aad058e26f9858a064b3e79ecc55dcc7c4704324e6df98587db1fdbe676f2f1fc1d8ec807284b1bbfe715f290849f84837fdf7f20f1a3c7614fe9d7

  • SSDEEP

    24576:iypNHUTrMyMV5Ka1Is2Uci+Cag04k65pKFcUs2:JfU3MRV5Ka1jIq7reGUs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\048700b2d255350f6973630bd02c5a53719ea46d4ced02c507e4605b2c56f7a1.exe
    "C:\Users\Admin\AppData\Local\Temp\048700b2d255350f6973630bd02c5a53719ea46d4ced02c507e4605b2c56f7a1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6540.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6540.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4155.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4155.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9977.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9977.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu308085.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu308085.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3092
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0653.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0653.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1452
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGC70s72.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGC70s72.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en504826.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en504826.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge384721.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge384721.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4908
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:708
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3188
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4356
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4884
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4744
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5108
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4488
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4996
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:5004
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:5064
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:3352

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                be308b1dda7bf9df49934be8a8e2c0a5

                SHA1

                9b5425dc33df4055ecf02c92de5e65b4facf1b0a

                SHA256

                0fb99866c08af0d3fad5178f66363df9961bf78fb77bcb9a1c84d5c9afa093a8

                SHA512

                2dfb0f4d93810b937c5e63c20194f04dd9b0491e967b7525f28699bb371a9812f9b4d6b34b05de3de3fa66994c48c3605844211f302263edaece8fb129524154

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                be308b1dda7bf9df49934be8a8e2c0a5

                SHA1

                9b5425dc33df4055ecf02c92de5e65b4facf1b0a

                SHA256

                0fb99866c08af0d3fad5178f66363df9961bf78fb77bcb9a1c84d5c9afa093a8

                SHA512

                2dfb0f4d93810b937c5e63c20194f04dd9b0491e967b7525f28699bb371a9812f9b4d6b34b05de3de3fa66994c48c3605844211f302263edaece8fb129524154

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                be308b1dda7bf9df49934be8a8e2c0a5

                SHA1

                9b5425dc33df4055ecf02c92de5e65b4facf1b0a

                SHA256

                0fb99866c08af0d3fad5178f66363df9961bf78fb77bcb9a1c84d5c9afa093a8

                SHA512

                2dfb0f4d93810b937c5e63c20194f04dd9b0491e967b7525f28699bb371a9812f9b4d6b34b05de3de3fa66994c48c3605844211f302263edaece8fb129524154

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                be308b1dda7bf9df49934be8a8e2c0a5

                SHA1

                9b5425dc33df4055ecf02c92de5e65b4facf1b0a

                SHA256

                0fb99866c08af0d3fad5178f66363df9961bf78fb77bcb9a1c84d5c9afa093a8

                SHA512

                2dfb0f4d93810b937c5e63c20194f04dd9b0491e967b7525f28699bb371a9812f9b4d6b34b05de3de3fa66994c48c3605844211f302263edaece8fb129524154

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                be308b1dda7bf9df49934be8a8e2c0a5

                SHA1

                9b5425dc33df4055ecf02c92de5e65b4facf1b0a

                SHA256

                0fb99866c08af0d3fad5178f66363df9961bf78fb77bcb9a1c84d5c9afa093a8

                SHA512

                2dfb0f4d93810b937c5e63c20194f04dd9b0491e967b7525f28699bb371a9812f9b4d6b34b05de3de3fa66994c48c3605844211f302263edaece8fb129524154

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge384721.exe
                Filesize

                227KB

                MD5

                be308b1dda7bf9df49934be8a8e2c0a5

                SHA1

                9b5425dc33df4055ecf02c92de5e65b4facf1b0a

                SHA256

                0fb99866c08af0d3fad5178f66363df9961bf78fb77bcb9a1c84d5c9afa093a8

                SHA512

                2dfb0f4d93810b937c5e63c20194f04dd9b0491e967b7525f28699bb371a9812f9b4d6b34b05de3de3fa66994c48c3605844211f302263edaece8fb129524154

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge384721.exe
                Filesize

                227KB

                MD5

                be308b1dda7bf9df49934be8a8e2c0a5

                SHA1

                9b5425dc33df4055ecf02c92de5e65b4facf1b0a

                SHA256

                0fb99866c08af0d3fad5178f66363df9961bf78fb77bcb9a1c84d5c9afa093a8

                SHA512

                2dfb0f4d93810b937c5e63c20194f04dd9b0491e967b7525f28699bb371a9812f9b4d6b34b05de3de3fa66994c48c3605844211f302263edaece8fb129524154

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6540.exe
                Filesize

                822KB

                MD5

                06b0c7c56b2bcc101c669a73bcb6fb1c

                SHA1

                a1b817176b98c02f6d1921cee4529b41dcfc5b3d

                SHA256

                600e48f82027b8e1d8a97f12e4321175de36b9f7e307386349e41f61d2a87d74

                SHA512

                b5efc43875c11104409a0364329a0dd29f2b4e2b38fd47ad370c5be42e022614a8622ac3166ffd002fc3b7881a91c79261d9107020a78609cb69332418daa554

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6540.exe
                Filesize

                822KB

                MD5

                06b0c7c56b2bcc101c669a73bcb6fb1c

                SHA1

                a1b817176b98c02f6d1921cee4529b41dcfc5b3d

                SHA256

                600e48f82027b8e1d8a97f12e4321175de36b9f7e307386349e41f61d2a87d74

                SHA512

                b5efc43875c11104409a0364329a0dd29f2b4e2b38fd47ad370c5be42e022614a8622ac3166ffd002fc3b7881a91c79261d9107020a78609cb69332418daa554

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en504826.exe
                Filesize

                175KB

                MD5

                d4b36c9e34950dcca1b386c42733046c

                SHA1

                6674a141de095e9e47cb9ba5c3ad96487f24df69

                SHA256

                5a4326e780cd4eea0884e3b5926854ea3872d9746c41ae75ffe9da4ebd85f3f9

                SHA512

                e749296fce26e2f8abfaa99aa28b0740ac53b5b4575a9faf2f94234063351e2ab3fd0b53eb89df6df3fcc297f0ccb826677eb80064224bee685321a4bb570d9b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en504826.exe
                Filesize

                175KB

                MD5

                d4b36c9e34950dcca1b386c42733046c

                SHA1

                6674a141de095e9e47cb9ba5c3ad96487f24df69

                SHA256

                5a4326e780cd4eea0884e3b5926854ea3872d9746c41ae75ffe9da4ebd85f3f9

                SHA512

                e749296fce26e2f8abfaa99aa28b0740ac53b5b4575a9faf2f94234063351e2ab3fd0b53eb89df6df3fcc297f0ccb826677eb80064224bee685321a4bb570d9b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4155.exe
                Filesize

                680KB

                MD5

                d62b71ef8752e461c521f911ae7349cf

                SHA1

                6439cf526f1cc7e22e0182d11e039832c1f6571d

                SHA256

                6faaba330584c64a9e85a9b6365fb4b097a21fe8ac7fa4de76fb8983efde8a1a

                SHA512

                c455cbb01f4c33d73e3b60378c0e7dd0ab2f7cb61764d5814c4bdb92b9d100490a609bd113fa6a931938c433f62926e99cbff7cdd9243f936d85ef72be8e695c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4155.exe
                Filesize

                680KB

                MD5

                d62b71ef8752e461c521f911ae7349cf

                SHA1

                6439cf526f1cc7e22e0182d11e039832c1f6571d

                SHA256

                6faaba330584c64a9e85a9b6365fb4b097a21fe8ac7fa4de76fb8983efde8a1a

                SHA512

                c455cbb01f4c33d73e3b60378c0e7dd0ab2f7cb61764d5814c4bdb92b9d100490a609bd113fa6a931938c433f62926e99cbff7cdd9243f936d85ef72be8e695c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGC70s72.exe
                Filesize

                345KB

                MD5

                fab6b9ff40c1ca995d39ac22a866426b

                SHA1

                7eb3eaa91b8f85bd44a912383f3b9873b855e84b

                SHA256

                893036b149eee60e50c357b902fff7b2397a16df21421ccdd30760f3e2af683e

                SHA512

                6e9140465b0c636260ff3bd918f1e2c93a66b1e70fc77fa2c36372f4ce74a41489ef9b8ab58d278e8e6f5c6a55d77a3de7b8cc4f459ac62bb737173efa5215f5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGC70s72.exe
                Filesize

                345KB

                MD5

                fab6b9ff40c1ca995d39ac22a866426b

                SHA1

                7eb3eaa91b8f85bd44a912383f3b9873b855e84b

                SHA256

                893036b149eee60e50c357b902fff7b2397a16df21421ccdd30760f3e2af683e

                SHA512

                6e9140465b0c636260ff3bd918f1e2c93a66b1e70fc77fa2c36372f4ce74a41489ef9b8ab58d278e8e6f5c6a55d77a3de7b8cc4f459ac62bb737173efa5215f5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9977.exe
                Filesize

                344KB

                MD5

                4adbeba379d19bd5a723999addd59cd3

                SHA1

                4ae67aa5f8f30dba62952434d4d99ff088b2b72a

                SHA256

                eccafa2e81a9e3194b61c32d3530c3571e4d350891a23fec7de12acda24bb433

                SHA512

                ebe31ebea2051af0e12892589ba736cb79856f4c3fa73a79e532384067e7701b2ff2db9b185caa16fccbc569470507ffd4219b820f873e16069782b2433b3b9f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9977.exe
                Filesize

                344KB

                MD5

                4adbeba379d19bd5a723999addd59cd3

                SHA1

                4ae67aa5f8f30dba62952434d4d99ff088b2b72a

                SHA256

                eccafa2e81a9e3194b61c32d3530c3571e4d350891a23fec7de12acda24bb433

                SHA512

                ebe31ebea2051af0e12892589ba736cb79856f4c3fa73a79e532384067e7701b2ff2db9b185caa16fccbc569470507ffd4219b820f873e16069782b2433b3b9f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu308085.exe
                Filesize

                11KB

                MD5

                5d9d3d5a8c57cd33d3fe903e5b9bbe8d

                SHA1

                b2a41645a7372b04609d5948f0876da80b39cafd

                SHA256

                26ed711a03ced5b0e3cc1023074eaad8f7c4badee38c5d1f9d768ff3ba327248

                SHA512

                f123e6bfc105145f0d04b49fecc3f2ca30c89ddbf12cd36b714f5738da2e43438f4e0ac940080f62d098b6e0b8fb1593483a477978c4c6edcdf89072f99a0361

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu308085.exe
                Filesize

                11KB

                MD5

                5d9d3d5a8c57cd33d3fe903e5b9bbe8d

                SHA1

                b2a41645a7372b04609d5948f0876da80b39cafd

                SHA256

                26ed711a03ced5b0e3cc1023074eaad8f7c4badee38c5d1f9d768ff3ba327248

                SHA512

                f123e6bfc105145f0d04b49fecc3f2ca30c89ddbf12cd36b714f5738da2e43438f4e0ac940080f62d098b6e0b8fb1593483a477978c4c6edcdf89072f99a0361

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0653.exe
                Filesize

                291KB

                MD5

                fa8b072b73ca08469010540028c6e15f

                SHA1

                3e3c8a4c929ffa43d54500c2b0e032b2fb02bee9

                SHA256

                0abd3645667a192dc4d39319b454d6294f5b354501ef0de15ca85f5700482647

                SHA512

                961e24a7a86f5a6bcc7fb23a78d52bdcb7469fd5af51e46bc8e6ac9e2c11fc35b76720534748880137c4d75ca0128986193f9d0c10e970d19943bd002fe165c2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0653.exe
                Filesize

                291KB

                MD5

                fa8b072b73ca08469010540028c6e15f

                SHA1

                3e3c8a4c929ffa43d54500c2b0e032b2fb02bee9

                SHA256

                0abd3645667a192dc4d39319b454d6294f5b354501ef0de15ca85f5700482647

                SHA512

                961e24a7a86f5a6bcc7fb23a78d52bdcb7469fd5af51e46bc8e6ac9e2c11fc35b76720534748880137c4d75ca0128986193f9d0c10e970d19943bd002fe165c2

              • memory/1452-169-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-185-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-168-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
                Filesize

                64KB

              • memory/1452-165-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-166-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
                Filesize

                64KB

              • memory/1452-171-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-173-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-175-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-177-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-179-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-181-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-183-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-187-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-164-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
                Filesize

                64KB

              • memory/1452-189-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-190-0x0000000000400000-0x000000000070B000-memory.dmp
                Filesize

                3.0MB

              • memory/1452-191-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
                Filesize

                64KB

              • memory/1452-192-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
                Filesize

                64KB

              • memory/1452-193-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
                Filesize

                64KB

              • memory/1452-195-0x0000000000400000-0x000000000070B000-memory.dmp
                Filesize

                3.0MB

              • memory/1452-163-0x00000000007E0000-0x000000000080D000-memory.dmp
                Filesize

                180KB

              • memory/1452-159-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-161-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-158-0x0000000002420000-0x0000000002432000-memory.dmp
                Filesize

                72KB

              • memory/1452-157-0x0000000002420000-0x0000000002438000-memory.dmp
                Filesize

                96KB

              • memory/1452-156-0x0000000004EB0000-0x00000000053AE000-memory.dmp
                Filesize

                5.0MB

              • memory/1452-155-0x0000000002370000-0x000000000238A000-memory.dmp
                Filesize

                104KB

              • memory/2228-207-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-1116-0x00000000061F0000-0x0000000006200000-memory.dmp
                Filesize

                64KB

              • memory/2228-215-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-217-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-219-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-221-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-223-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-225-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-227-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-229-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-231-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-233-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-235-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-336-0x0000000001B00000-0x0000000001B4B000-memory.dmp
                Filesize

                300KB

              • memory/2228-337-0x00000000061F0000-0x0000000006200000-memory.dmp
                Filesize

                64KB

              • memory/2228-342-0x00000000061F0000-0x0000000006200000-memory.dmp
                Filesize

                64KB

              • memory/2228-340-0x00000000061F0000-0x0000000006200000-memory.dmp
                Filesize

                64KB

              • memory/2228-1112-0x0000000006700000-0x0000000006D06000-memory.dmp
                Filesize

                6.0MB

              • memory/2228-1113-0x00000000060E0000-0x00000000061EA000-memory.dmp
                Filesize

                1.0MB

              • memory/2228-1114-0x0000000006D10000-0x0000000006D22000-memory.dmp
                Filesize

                72KB

              • memory/2228-1115-0x0000000006D30000-0x0000000006D6E000-memory.dmp
                Filesize

                248KB

              • memory/2228-213-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-1117-0x0000000006E80000-0x0000000006ECB000-memory.dmp
                Filesize

                300KB

              • memory/2228-1119-0x0000000007010000-0x00000000070A2000-memory.dmp
                Filesize

                584KB

              • memory/2228-1120-0x00000000070B0000-0x0000000007116000-memory.dmp
                Filesize

                408KB

              • memory/2228-1121-0x00000000061F0000-0x0000000006200000-memory.dmp
                Filesize

                64KB

              • memory/2228-1122-0x00000000061F0000-0x0000000006200000-memory.dmp
                Filesize

                64KB

              • memory/2228-1123-0x00000000061F0000-0x0000000006200000-memory.dmp
                Filesize

                64KB

              • memory/2228-1124-0x0000000007A40000-0x0000000007C02000-memory.dmp
                Filesize

                1.8MB

              • memory/2228-1125-0x0000000007C20000-0x000000000814C000-memory.dmp
                Filesize

                5.2MB

              • memory/2228-1126-0x00000000061F0000-0x0000000006200000-memory.dmp
                Filesize

                64KB

              • memory/2228-1127-0x0000000008380000-0x00000000083F6000-memory.dmp
                Filesize

                472KB

              • memory/2228-1128-0x0000000008400000-0x0000000008450000-memory.dmp
                Filesize

                320KB

              • memory/2228-200-0x00000000035B0000-0x00000000035F6000-memory.dmp
                Filesize

                280KB

              • memory/2228-201-0x0000000003960000-0x00000000039A4000-memory.dmp
                Filesize

                272KB

              • memory/2228-202-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-211-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-209-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-205-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2228-203-0x0000000003960000-0x000000000399F000-memory.dmp
                Filesize

                252KB

              • memory/2260-1136-0x0000000004FF0000-0x0000000005000000-memory.dmp
                Filesize

                64KB

              • memory/2260-1135-0x0000000005200000-0x000000000524B000-memory.dmp
                Filesize

                300KB

              • memory/2260-1134-0x00000000007C0000-0x00000000007F2000-memory.dmp
                Filesize

                200KB

              • memory/3092-149-0x0000000000830000-0x000000000083A000-memory.dmp
                Filesize

                40KB