Analysis

  • max time kernel
    112s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 08:08

General

  • Target

    file.exe

  • Size

    1.0MB

  • MD5

    cc2fe266156c4bed451c1bf424bb59e9

  • SHA1

    65255e906d16382ddef9b1862b4edc715b02d2a3

  • SHA256

    1873acdc5f269c522e854bad948b808ad40610c461e3ae59f1ceb723aedae3a6

  • SHA512

    957039cd3842f6ea8e5b88d4d8a9afe905201159d054a9bde24afba105a8537d059c48dca16c7ef4bcd929983c2d360f83762263980d66aaf6d7b2bb666ec3bb

  • SSDEEP

    24576:rTy5vgotcLGeqHXLzZqwe/z0b0k/H6mMLxVQ8ILbfj:rmmooKb1qxkfoLf0v

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina0146.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina0146.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8605.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8605.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4740
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1912.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1912.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3716
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu130516.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu130516.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1908
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4021.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4021.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3312
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 1080
              6⤵
              • Program crash
              PID:2884
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dKA67s32.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dKA67s32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4912
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 1348
            5⤵
            • Program crash
            PID:5116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en502611.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en502611.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge811550.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge811550.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3848
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4548
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4044
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3728
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4880
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4640
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4324
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4824
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:1968
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3312 -ip 3312
                1⤵
                  PID:1160
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4912 -ip 4912
                  1⤵
                    PID:5004
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2892

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Scheduled Task

                  1
                  T1053

                  Persistence

                  Modify Existing Service

                  1
                  T1031

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Scheduled Task

                  1
                  T1053

                  Privilege Escalation

                  Scheduled Task

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  3
                  T1112

                  Disabling Security Tools

                  2
                  T1089

                  Credential Access

                  Credentials in Files

                  2
                  T1081

                  Discovery

                  Query Registry

                  2
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Collection

                  Data from Local System

                  2
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    227KB

                    MD5

                    730f2a0967c0dd550fd40d21a3f8bffa

                    SHA1

                    8387226223b1e497e97200b72cd2ba7782f0e084

                    SHA256

                    b7cd1b4d6607e99cb5f69b973f27d3cfe1864833513c7a9f260aa47c8f6fdf3f

                    SHA512

                    baf551433fc79d0cad4b61926673f7d60772b8b2f14b42614d75b3c3004c43da049c4daf817f9afffc242abdd12257320989dab8c16fc90332337b8d34b354e5

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    227KB

                    MD5

                    730f2a0967c0dd550fd40d21a3f8bffa

                    SHA1

                    8387226223b1e497e97200b72cd2ba7782f0e084

                    SHA256

                    b7cd1b4d6607e99cb5f69b973f27d3cfe1864833513c7a9f260aa47c8f6fdf3f

                    SHA512

                    baf551433fc79d0cad4b61926673f7d60772b8b2f14b42614d75b3c3004c43da049c4daf817f9afffc242abdd12257320989dab8c16fc90332337b8d34b354e5

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    227KB

                    MD5

                    730f2a0967c0dd550fd40d21a3f8bffa

                    SHA1

                    8387226223b1e497e97200b72cd2ba7782f0e084

                    SHA256

                    b7cd1b4d6607e99cb5f69b973f27d3cfe1864833513c7a9f260aa47c8f6fdf3f

                    SHA512

                    baf551433fc79d0cad4b61926673f7d60772b8b2f14b42614d75b3c3004c43da049c4daf817f9afffc242abdd12257320989dab8c16fc90332337b8d34b354e5

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    227KB

                    MD5

                    730f2a0967c0dd550fd40d21a3f8bffa

                    SHA1

                    8387226223b1e497e97200b72cd2ba7782f0e084

                    SHA256

                    b7cd1b4d6607e99cb5f69b973f27d3cfe1864833513c7a9f260aa47c8f6fdf3f

                    SHA512

                    baf551433fc79d0cad4b61926673f7d60772b8b2f14b42614d75b3c3004c43da049c4daf817f9afffc242abdd12257320989dab8c16fc90332337b8d34b354e5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge811550.exe
                    Filesize

                    227KB

                    MD5

                    730f2a0967c0dd550fd40d21a3f8bffa

                    SHA1

                    8387226223b1e497e97200b72cd2ba7782f0e084

                    SHA256

                    b7cd1b4d6607e99cb5f69b973f27d3cfe1864833513c7a9f260aa47c8f6fdf3f

                    SHA512

                    baf551433fc79d0cad4b61926673f7d60772b8b2f14b42614d75b3c3004c43da049c4daf817f9afffc242abdd12257320989dab8c16fc90332337b8d34b354e5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge811550.exe
                    Filesize

                    227KB

                    MD5

                    730f2a0967c0dd550fd40d21a3f8bffa

                    SHA1

                    8387226223b1e497e97200b72cd2ba7782f0e084

                    SHA256

                    b7cd1b4d6607e99cb5f69b973f27d3cfe1864833513c7a9f260aa47c8f6fdf3f

                    SHA512

                    baf551433fc79d0cad4b61926673f7d60772b8b2f14b42614d75b3c3004c43da049c4daf817f9afffc242abdd12257320989dab8c16fc90332337b8d34b354e5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina0146.exe
                    Filesize

                    847KB

                    MD5

                    1d607b8d4b514ea9f8a24ddb3544612f

                    SHA1

                    12904d08c9fe084f722e687bddd0a278d79fbabf

                    SHA256

                    0bd7ce8bc46251efd1aee112703be41bf76626ea7a1c66f25a92a878a183b5b5

                    SHA512

                    49763938d6da250ed8b21c331451ada3310f880e555db5a472bdb24496924e257dd2bb90b958a2c39efd253001ebb9c08313c3cebe9bf7b0b6318432c94bff1f

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina0146.exe
                    Filesize

                    847KB

                    MD5

                    1d607b8d4b514ea9f8a24ddb3544612f

                    SHA1

                    12904d08c9fe084f722e687bddd0a278d79fbabf

                    SHA256

                    0bd7ce8bc46251efd1aee112703be41bf76626ea7a1c66f25a92a878a183b5b5

                    SHA512

                    49763938d6da250ed8b21c331451ada3310f880e555db5a472bdb24496924e257dd2bb90b958a2c39efd253001ebb9c08313c3cebe9bf7b0b6318432c94bff1f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en502611.exe
                    Filesize

                    175KB

                    MD5

                    ff660499a5256c0b5d4f070e4a179150

                    SHA1

                    d3df324fb84aa04dbf66eab67d274f63f7516621

                    SHA256

                    f06753e7a5e5f16486cd8418a349b1750faa184e5a2d4b55472a238f135c5370

                    SHA512

                    8127fb9dd37ef972d03cbeab458a9712908b2fadd7f293cfe65a4db6f90f40dd1170c0e4a9dd9e7f58a76c671b68af52f25eaa39fb60b6daebbae26ab737938f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en502611.exe
                    Filesize

                    175KB

                    MD5

                    ff660499a5256c0b5d4f070e4a179150

                    SHA1

                    d3df324fb84aa04dbf66eab67d274f63f7516621

                    SHA256

                    f06753e7a5e5f16486cd8418a349b1750faa184e5a2d4b55472a238f135c5370

                    SHA512

                    8127fb9dd37ef972d03cbeab458a9712908b2fadd7f293cfe65a4db6f90f40dd1170c0e4a9dd9e7f58a76c671b68af52f25eaa39fb60b6daebbae26ab737938f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8605.exe
                    Filesize

                    705KB

                    MD5

                    c1a00cc53a7be36fec998fdef8a1d7f0

                    SHA1

                    0ae1b302a9bbf58d469b352135f194e7624b34de

                    SHA256

                    911d2d2ad436e8dcf9fc3e08a4e1380b681b8c3277089559962d4a38bfad358f

                    SHA512

                    2ebd369ec4825917a28d91d5f2ac6b3d1fd1c681b36f9594b702bf633047b491ee352ac15b0158cc584ac8dac4ca5f8541785d49cd4108b5fa6efdf9303bbb83

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8605.exe
                    Filesize

                    705KB

                    MD5

                    c1a00cc53a7be36fec998fdef8a1d7f0

                    SHA1

                    0ae1b302a9bbf58d469b352135f194e7624b34de

                    SHA256

                    911d2d2ad436e8dcf9fc3e08a4e1380b681b8c3277089559962d4a38bfad358f

                    SHA512

                    2ebd369ec4825917a28d91d5f2ac6b3d1fd1c681b36f9594b702bf633047b491ee352ac15b0158cc584ac8dac4ca5f8541785d49cd4108b5fa6efdf9303bbb83

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dKA67s32.exe
                    Filesize

                    380KB

                    MD5

                    7d2d3e136b0efcd7ca8a7310d5af4bfc

                    SHA1

                    a670bab9cbb1b03e6b77de2e38492c65c98cbdf2

                    SHA256

                    c56e9a1e167c8cac71d27b4b935ee6654396da8d94020dcbb424892da60c368f

                    SHA512

                    7f2bff2defb62f127859d02e688eaa2d2b4bc7336fc1d0c306b003b6e26789b63a72b0d3c3aaf2a7ce2fba6154053a649cde11c24ba0f7fc8f924308a7780887

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dKA67s32.exe
                    Filesize

                    380KB

                    MD5

                    7d2d3e136b0efcd7ca8a7310d5af4bfc

                    SHA1

                    a670bab9cbb1b03e6b77de2e38492c65c98cbdf2

                    SHA256

                    c56e9a1e167c8cac71d27b4b935ee6654396da8d94020dcbb424892da60c368f

                    SHA512

                    7f2bff2defb62f127859d02e688eaa2d2b4bc7336fc1d0c306b003b6e26789b63a72b0d3c3aaf2a7ce2fba6154053a649cde11c24ba0f7fc8f924308a7780887

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1912.exe
                    Filesize

                    349KB

                    MD5

                    b1ff58f61d2aa834688aef38af2378d6

                    SHA1

                    d918caac446ef1dd3f259ca4e8c48fb7973ec691

                    SHA256

                    188027f5bcad4c553091efe736a67afdb50064116dd4589593a240dfd2ae35eb

                    SHA512

                    687dccb1dfeb5a98a08dc4ecf5c69f34d2922b2d19e9ff7bc746c570f11290be3ffb9f7c7075458dce595692c5c5400ec2f65e9e50408990631a6943e83eb6c8

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1912.exe
                    Filesize

                    349KB

                    MD5

                    b1ff58f61d2aa834688aef38af2378d6

                    SHA1

                    d918caac446ef1dd3f259ca4e8c48fb7973ec691

                    SHA256

                    188027f5bcad4c553091efe736a67afdb50064116dd4589593a240dfd2ae35eb

                    SHA512

                    687dccb1dfeb5a98a08dc4ecf5c69f34d2922b2d19e9ff7bc746c570f11290be3ffb9f7c7075458dce595692c5c5400ec2f65e9e50408990631a6943e83eb6c8

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu130516.exe
                    Filesize

                    11KB

                    MD5

                    3a80fb2832b8518b7d2833f1387de700

                    SHA1

                    0929c9ae5ef1d0f1d06d233f47d7aeebadb6b9df

                    SHA256

                    b60422cc9290f2b1696202b4a02d8666608496b946edb996a8fec1887632a91a

                    SHA512

                    a90efbb5e35fb737fdbe64871391020c8d97136653547c84bfdca25aa0013d1bd3efd76e237ed8fb9a6ad1bbeb320ed51b4e2b28df5601b9ce207f7de6a58bda

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu130516.exe
                    Filesize

                    11KB

                    MD5

                    3a80fb2832b8518b7d2833f1387de700

                    SHA1

                    0929c9ae5ef1d0f1d06d233f47d7aeebadb6b9df

                    SHA256

                    b60422cc9290f2b1696202b4a02d8666608496b946edb996a8fec1887632a91a

                    SHA512

                    a90efbb5e35fb737fdbe64871391020c8d97136653547c84bfdca25aa0013d1bd3efd76e237ed8fb9a6ad1bbeb320ed51b4e2b28df5601b9ce207f7de6a58bda

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4021.exe
                    Filesize

                    321KB

                    MD5

                    83644e8832df3553584d03d2da0afc90

                    SHA1

                    9d83e1a4e3fd0ce0f041b367a7d8d1a99e4ddf52

                    SHA256

                    94c3018a3774022f86423aaa5b9c00f9db5f93b283f461ca4835f3b63d910445

                    SHA512

                    15371916f13c167936358f6a09106caf16d1bfd96db8ad2e43f67428371ed693bfe24ec486b6c140471810e98a6036f289e469f748c8ac69870f1a458a5a935e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4021.exe
                    Filesize

                    321KB

                    MD5

                    83644e8832df3553584d03d2da0afc90

                    SHA1

                    9d83e1a4e3fd0ce0f041b367a7d8d1a99e4ddf52

                    SHA256

                    94c3018a3774022f86423aaa5b9c00f9db5f93b283f461ca4835f3b63d910445

                    SHA512

                    15371916f13c167936358f6a09106caf16d1bfd96db8ad2e43f67428371ed693bfe24ec486b6c140471810e98a6036f289e469f748c8ac69870f1a458a5a935e

                  • memory/948-1142-0x0000000004D70000-0x0000000004D80000-memory.dmp
                    Filesize

                    64KB

                  • memory/948-1143-0x0000000004D70000-0x0000000004D80000-memory.dmp
                    Filesize

                    64KB

                  • memory/948-1141-0x00000000001E0000-0x0000000000212000-memory.dmp
                    Filesize

                    200KB

                  • memory/1908-161-0x0000000000CA0000-0x0000000000CAA000-memory.dmp
                    Filesize

                    40KB

                  • memory/3312-179-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-203-0x0000000004940000-0x0000000004950000-memory.dmp
                    Filesize

                    64KB

                  • memory/3312-183-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-185-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-187-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-189-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-191-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-193-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-195-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-197-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-199-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-200-0x0000000000400000-0x0000000002B7E000-memory.dmp
                    Filesize

                    39.5MB

                  • memory/3312-202-0x0000000004940000-0x0000000004950000-memory.dmp
                    Filesize

                    64KB

                  • memory/3312-181-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-201-0x0000000004940000-0x0000000004950000-memory.dmp
                    Filesize

                    64KB

                  • memory/3312-205-0x0000000000400000-0x0000000002B7E000-memory.dmp
                    Filesize

                    39.5MB

                  • memory/3312-177-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-175-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-173-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-172-0x00000000049C0000-0x00000000049D2000-memory.dmp
                    Filesize

                    72KB

                  • memory/3312-171-0x0000000004940000-0x0000000004950000-memory.dmp
                    Filesize

                    64KB

                  • memory/3312-170-0x0000000004940000-0x0000000004950000-memory.dmp
                    Filesize

                    64KB

                  • memory/3312-169-0x0000000004940000-0x0000000004950000-memory.dmp
                    Filesize

                    64KB

                  • memory/3312-168-0x0000000002C50000-0x0000000002C7D000-memory.dmp
                    Filesize

                    180KB

                  • memory/3312-167-0x00000000070D0000-0x0000000007674000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/4912-213-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-229-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-231-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-233-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4912-232-0x0000000002C60000-0x0000000002CAB000-memory.dmp
                    Filesize

                    300KB

                  • memory/4912-236-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-239-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-235-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4912-237-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4912-241-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-243-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-245-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-247-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-1120-0x00000000078D0000-0x0000000007EE8000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/4912-1121-0x0000000007F70000-0x000000000807A000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/4912-1122-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4912-1123-0x00000000080B0000-0x00000000080C2000-memory.dmp
                    Filesize

                    72KB

                  • memory/4912-1124-0x00000000080D0000-0x000000000810C000-memory.dmp
                    Filesize

                    240KB

                  • memory/4912-1126-0x00000000083C0000-0x0000000008426000-memory.dmp
                    Filesize

                    408KB

                  • memory/4912-1127-0x0000000008A80000-0x0000000008B12000-memory.dmp
                    Filesize

                    584KB

                  • memory/4912-1128-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4912-1129-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4912-1130-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4912-1131-0x0000000008B60000-0x0000000008BD6000-memory.dmp
                    Filesize

                    472KB

                  • memory/4912-1132-0x0000000008BF0000-0x0000000008C40000-memory.dmp
                    Filesize

                    320KB

                  • memory/4912-1133-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4912-227-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-223-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-225-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-221-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-219-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-217-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-215-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-211-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-210-0x0000000004E00000-0x0000000004E3F000-memory.dmp
                    Filesize

                    252KB

                  • memory/4912-1134-0x0000000008FF0000-0x00000000091B2000-memory.dmp
                    Filesize

                    1.8MB

                  • memory/4912-1135-0x0000000009200000-0x000000000972C000-memory.dmp
                    Filesize

                    5.2MB