Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 08:15

General

  • Target

    06d66708ead10b54659f09b7a05806443fd5afdc7d3e07d04306024b9202bfbe.exe

  • Size

    1.0MB

  • MD5

    9225ef4e967531ce3da08705bc7adf53

  • SHA1

    117da5bb9bb0993cb2c294b3b84cf2b57760abeb

  • SHA256

    06d66708ead10b54659f09b7a05806443fd5afdc7d3e07d04306024b9202bfbe

  • SHA512

    25f9a302f62f7adf23cd70041abd536fe08780922154f5b0bc3b20d8739b3f513e795b28158c799852e2610b813d595f2df65c5cbab468f588dbfc91fdde77b0

  • SSDEEP

    24576:GyPkanJEMWXcJfs4wFqFVHP4BUmmLkgqOp5BF1D3:V8fsJfs7gF5QBMLx5j

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06d66708ead10b54659f09b7a05806443fd5afdc7d3e07d04306024b9202bfbe.exe
    "C:\Users\Admin\AppData\Local\Temp\06d66708ead10b54659f09b7a05806443fd5afdc7d3e07d04306024b9202bfbe.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8417.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8417.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8843.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8843.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5105.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5105.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2828
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu742616.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu742616.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4868
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4250.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4250.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4260
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ddp65s94.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ddp65s94.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en972490.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en972490.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge830171.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge830171.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1892
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4364
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4316
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3344
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:3144
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5068
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5064
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4936
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:3824
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4900

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                8ba2d295d905590c7833ce24be65c5ef

                SHA1

                7183a74509f83c7d8285e04d8f1264c68e390885

                SHA256

                b2da8de1f291f12b05b181f7dc53572cdd3af66130c6149df6493857973f87cf

                SHA512

                3cb5f5e047e7b4f536be503281b1573aff06799722262a7e2e02b4e6e9495e6387941c17070208e63e5a5f268421014c1744d52c59538ff0690f8bf50c21d54d

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                8ba2d295d905590c7833ce24be65c5ef

                SHA1

                7183a74509f83c7d8285e04d8f1264c68e390885

                SHA256

                b2da8de1f291f12b05b181f7dc53572cdd3af66130c6149df6493857973f87cf

                SHA512

                3cb5f5e047e7b4f536be503281b1573aff06799722262a7e2e02b4e6e9495e6387941c17070208e63e5a5f268421014c1744d52c59538ff0690f8bf50c21d54d

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                8ba2d295d905590c7833ce24be65c5ef

                SHA1

                7183a74509f83c7d8285e04d8f1264c68e390885

                SHA256

                b2da8de1f291f12b05b181f7dc53572cdd3af66130c6149df6493857973f87cf

                SHA512

                3cb5f5e047e7b4f536be503281b1573aff06799722262a7e2e02b4e6e9495e6387941c17070208e63e5a5f268421014c1744d52c59538ff0690f8bf50c21d54d

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                8ba2d295d905590c7833ce24be65c5ef

                SHA1

                7183a74509f83c7d8285e04d8f1264c68e390885

                SHA256

                b2da8de1f291f12b05b181f7dc53572cdd3af66130c6149df6493857973f87cf

                SHA512

                3cb5f5e047e7b4f536be503281b1573aff06799722262a7e2e02b4e6e9495e6387941c17070208e63e5a5f268421014c1744d52c59538ff0690f8bf50c21d54d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge830171.exe
                Filesize

                227KB

                MD5

                8ba2d295d905590c7833ce24be65c5ef

                SHA1

                7183a74509f83c7d8285e04d8f1264c68e390885

                SHA256

                b2da8de1f291f12b05b181f7dc53572cdd3af66130c6149df6493857973f87cf

                SHA512

                3cb5f5e047e7b4f536be503281b1573aff06799722262a7e2e02b4e6e9495e6387941c17070208e63e5a5f268421014c1744d52c59538ff0690f8bf50c21d54d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge830171.exe
                Filesize

                227KB

                MD5

                8ba2d295d905590c7833ce24be65c5ef

                SHA1

                7183a74509f83c7d8285e04d8f1264c68e390885

                SHA256

                b2da8de1f291f12b05b181f7dc53572cdd3af66130c6149df6493857973f87cf

                SHA512

                3cb5f5e047e7b4f536be503281b1573aff06799722262a7e2e02b4e6e9495e6387941c17070208e63e5a5f268421014c1744d52c59538ff0690f8bf50c21d54d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8417.exe
                Filesize

                847KB

                MD5

                8d0b4162f249ccadaf69cc2267ba5918

                SHA1

                fe85fad3b1c57bcc07bf3f494c82ff75c7ae390e

                SHA256

                1bfda0f34491b01ba07113018b6891e43fe2164df83552e73a584e23a857edd2

                SHA512

                0ee9e8a4788675b8311a5ca764d3b282d94093373bebb4a618e756e50855c740c9cd8a202095f783f23dd54f453fda77199e97a74651c4bc142e0ef2cac7ba81

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8417.exe
                Filesize

                847KB

                MD5

                8d0b4162f249ccadaf69cc2267ba5918

                SHA1

                fe85fad3b1c57bcc07bf3f494c82ff75c7ae390e

                SHA256

                1bfda0f34491b01ba07113018b6891e43fe2164df83552e73a584e23a857edd2

                SHA512

                0ee9e8a4788675b8311a5ca764d3b282d94093373bebb4a618e756e50855c740c9cd8a202095f783f23dd54f453fda77199e97a74651c4bc142e0ef2cac7ba81

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en972490.exe
                Filesize

                175KB

                MD5

                bbc890a7bbc80a0fb37afa5d04bc06d2

                SHA1

                511456d3c638bd83ab72a814822b25363c0801be

                SHA256

                9ea1b30aa5a0454493960ef68689558e787a1dbc371d08c867d56ac18301152b

                SHA512

                e4e327a4c663aa815c6513754776ee7e9f07fb08001e24f40e2698f0bc6c62cc16e62971566c1bac823f3b300a4133c57959e68ba002da365d4415998bfa3a52

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en972490.exe
                Filesize

                175KB

                MD5

                bbc890a7bbc80a0fb37afa5d04bc06d2

                SHA1

                511456d3c638bd83ab72a814822b25363c0801be

                SHA256

                9ea1b30aa5a0454493960ef68689558e787a1dbc371d08c867d56ac18301152b

                SHA512

                e4e327a4c663aa815c6513754776ee7e9f07fb08001e24f40e2698f0bc6c62cc16e62971566c1bac823f3b300a4133c57959e68ba002da365d4415998bfa3a52

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8843.exe
                Filesize

                705KB

                MD5

                b3438642f4f3650034432d4ab75aaaee

                SHA1

                46dbd64f14c3f6c022bc398843cb40b075378012

                SHA256

                aca9b50654531e00493a604152e4de598dc4e7ba3f263ae075f7dafe027baf8c

                SHA512

                76e0d56eb6bdcb3fb913d07a4b7c7381fb74a0d2a35962689e50bc95b900b5f5837014ea40cbe15e6fbabfb3597cfa9f51d832da482785fe518465b2e23cbfd7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8843.exe
                Filesize

                705KB

                MD5

                b3438642f4f3650034432d4ab75aaaee

                SHA1

                46dbd64f14c3f6c022bc398843cb40b075378012

                SHA256

                aca9b50654531e00493a604152e4de598dc4e7ba3f263ae075f7dafe027baf8c

                SHA512

                76e0d56eb6bdcb3fb913d07a4b7c7381fb74a0d2a35962689e50bc95b900b5f5837014ea40cbe15e6fbabfb3597cfa9f51d832da482785fe518465b2e23cbfd7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ddp65s94.exe
                Filesize

                380KB

                MD5

                a47d79b7155a735b319f0e7b943380d3

                SHA1

                79387782e33fa06dd8ba839963d73757bd17bb82

                SHA256

                3648bd61f0c5e70a1685a6f2e4d6859b12e469d258615981a8f4f6b4e72b7a6f

                SHA512

                dacf264e84fd91d7af2704ef6ef90b287c4f40b45d1fd1e4ee70a4026aec66e26dc2f78f307fb9e263c0b56e5488cfa5f6b2df594d18c0a042701b5c02215974

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ddp65s94.exe
                Filesize

                380KB

                MD5

                a47d79b7155a735b319f0e7b943380d3

                SHA1

                79387782e33fa06dd8ba839963d73757bd17bb82

                SHA256

                3648bd61f0c5e70a1685a6f2e4d6859b12e469d258615981a8f4f6b4e72b7a6f

                SHA512

                dacf264e84fd91d7af2704ef6ef90b287c4f40b45d1fd1e4ee70a4026aec66e26dc2f78f307fb9e263c0b56e5488cfa5f6b2df594d18c0a042701b5c02215974

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5105.exe
                Filesize

                349KB

                MD5

                c5aae1f73f7a6c150e99b56b0e8b9c6a

                SHA1

                d4bc96bd84e0944b3b783b4e55639b97256f570f

                SHA256

                5ba29e0d936376f79e537aeedf623b8d997b3522f4e6e4f6668bd66ebc1210dc

                SHA512

                b40b696fda5e7c2e8c9d237de6b6b171fcda79d77069e5f95f632a7a54bd90c635338e8c26eb7e4e2718b2693604f2aa8682f31f5661289b2d355094ee86bd28

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5105.exe
                Filesize

                349KB

                MD5

                c5aae1f73f7a6c150e99b56b0e8b9c6a

                SHA1

                d4bc96bd84e0944b3b783b4e55639b97256f570f

                SHA256

                5ba29e0d936376f79e537aeedf623b8d997b3522f4e6e4f6668bd66ebc1210dc

                SHA512

                b40b696fda5e7c2e8c9d237de6b6b171fcda79d77069e5f95f632a7a54bd90c635338e8c26eb7e4e2718b2693604f2aa8682f31f5661289b2d355094ee86bd28

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu742616.exe
                Filesize

                11KB

                MD5

                a489f76b1e20676c44e20a1265d95bd2

                SHA1

                4adea8e3285c282db000d943bb98a5a7b9f797b7

                SHA256

                4c2d887e30ef21d4754b422f989dd02647ffd5ecfeea4342034e646e914ea32d

                SHA512

                06b205ec385ac02692a039cff628c8c5dcc4d1e388a05d4bdc8ad6b7f6efc61a3caf8c9bd9f18d08f321a4e11d27932af8a0ca8bc60bf62d2dbf0a8075bbcfa3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu742616.exe
                Filesize

                11KB

                MD5

                a489f76b1e20676c44e20a1265d95bd2

                SHA1

                4adea8e3285c282db000d943bb98a5a7b9f797b7

                SHA256

                4c2d887e30ef21d4754b422f989dd02647ffd5ecfeea4342034e646e914ea32d

                SHA512

                06b205ec385ac02692a039cff628c8c5dcc4d1e388a05d4bdc8ad6b7f6efc61a3caf8c9bd9f18d08f321a4e11d27932af8a0ca8bc60bf62d2dbf0a8075bbcfa3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4250.exe
                Filesize

                321KB

                MD5

                3ce59a899c38b733369fec9aeb2ce6ad

                SHA1

                b47634a87c38b57bd731edb14b7cba85a9815056

                SHA256

                aa0cd7ded31379879022404a39452ef5b820b4da76c5ce37a975d4f1c53844e9

                SHA512

                93b44c19abadc0cc351230fe6a606300d52f2ee8a1bf803f5da13146efb6f22dc1ed8d5097c29f9a5980c1cb32e808d487dc4ac31c16fd095fec0646c1afcab6

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4250.exe
                Filesize

                321KB

                MD5

                3ce59a899c38b733369fec9aeb2ce6ad

                SHA1

                b47634a87c38b57bd731edb14b7cba85a9815056

                SHA256

                aa0cd7ded31379879022404a39452ef5b820b4da76c5ce37a975d4f1c53844e9

                SHA512

                93b44c19abadc0cc351230fe6a606300d52f2ee8a1bf803f5da13146efb6f22dc1ed8d5097c29f9a5980c1cb32e808d487dc4ac31c16fd095fec0646c1afcab6

              • memory/2948-1136-0x0000000004FB0000-0x0000000004FFB000-memory.dmp
                Filesize

                300KB

              • memory/2948-1135-0x0000000005020000-0x0000000005030000-memory.dmp
                Filesize

                64KB

              • memory/2948-1134-0x0000000000730000-0x0000000000762000-memory.dmp
                Filesize

                200KB

              • memory/4260-169-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-190-0x0000000000400000-0x0000000002B7E000-memory.dmp
                Filesize

                39.5MB

              • memory/4260-171-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-173-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-175-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-177-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-179-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-181-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-183-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-185-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-187-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-188-0x0000000007320000-0x0000000007330000-memory.dmp
                Filesize

                64KB

              • memory/4260-189-0x0000000007320000-0x0000000007330000-memory.dmp
                Filesize

                64KB

              • memory/4260-167-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-191-0x0000000007320000-0x0000000007330000-memory.dmp
                Filesize

                64KB

              • memory/4260-195-0x0000000007320000-0x0000000007330000-memory.dmp
                Filesize

                64KB

              • memory/4260-194-0x0000000007320000-0x0000000007330000-memory.dmp
                Filesize

                64KB

              • memory/4260-193-0x0000000000400000-0x0000000002B7E000-memory.dmp
                Filesize

                39.5MB

              • memory/4260-165-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-163-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-160-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-161-0x0000000003090000-0x00000000030A2000-memory.dmp
                Filesize

                72KB

              • memory/4260-159-0x0000000003090000-0x00000000030A8000-memory.dmp
                Filesize

                96KB

              • memory/4260-158-0x0000000007330000-0x000000000782E000-memory.dmp
                Filesize

                5.0MB

              • memory/4260-157-0x0000000007320000-0x0000000007330000-memory.dmp
                Filesize

                64KB

              • memory/4260-156-0x0000000002E20000-0x0000000002E3A000-memory.dmp
                Filesize

                104KB

              • memory/4260-155-0x00000000001D0000-0x00000000001FD000-memory.dmp
                Filesize

                180KB

              • memory/4456-203-0x0000000007330000-0x0000000007340000-memory.dmp
                Filesize

                64KB

              • memory/4456-213-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-215-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-217-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-219-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-221-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-223-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-225-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-227-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-229-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-231-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-233-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-235-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-237-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-239-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-1112-0x0000000007840000-0x0000000007E46000-memory.dmp
                Filesize

                6.0MB

              • memory/4456-1113-0x0000000007E50000-0x0000000007F5A000-memory.dmp
                Filesize

                1.0MB

              • memory/4456-1114-0x0000000004BF0000-0x0000000004C02000-memory.dmp
                Filesize

                72KB

              • memory/4456-1115-0x0000000007330000-0x0000000007340000-memory.dmp
                Filesize

                64KB

              • memory/4456-1116-0x0000000007290000-0x00000000072CE000-memory.dmp
                Filesize

                248KB

              • memory/4456-1117-0x00000000072D0000-0x000000000731B000-memory.dmp
                Filesize

                300KB

              • memory/4456-1119-0x0000000007330000-0x0000000007340000-memory.dmp
                Filesize

                64KB

              • memory/4456-1120-0x0000000007330000-0x0000000007340000-memory.dmp
                Filesize

                64KB

              • memory/4456-1121-0x0000000007330000-0x0000000007340000-memory.dmp
                Filesize

                64KB

              • memory/4456-1122-0x0000000008170000-0x0000000008202000-memory.dmp
                Filesize

                584KB

              • memory/4456-1123-0x0000000008210000-0x0000000008276000-memory.dmp
                Filesize

                408KB

              • memory/4456-1124-0x0000000008A10000-0x0000000008A86000-memory.dmp
                Filesize

                472KB

              • memory/4456-1125-0x0000000008A90000-0x0000000008AE0000-memory.dmp
                Filesize

                320KB

              • memory/4456-1126-0x0000000008B10000-0x0000000008CD2000-memory.dmp
                Filesize

                1.8MB

              • memory/4456-211-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-207-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-209-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
                Filesize

                252KB

              • memory/4456-204-0x0000000007330000-0x0000000007340000-memory.dmp
                Filesize

                64KB

              • memory/4456-205-0x0000000007330000-0x0000000007340000-memory.dmp
                Filesize

                64KB

              • memory/4456-202-0x0000000002CB0000-0x0000000002CFB000-memory.dmp
                Filesize

                300KB

              • memory/4456-201-0x0000000004AB0000-0x0000000004AF4000-memory.dmp
                Filesize

                272KB

              • memory/4456-200-0x0000000004800000-0x0000000004846000-memory.dmp
                Filesize

                280KB

              • memory/4456-1127-0x0000000008CE0000-0x000000000920C000-memory.dmp
                Filesize

                5.2MB

              • memory/4456-1128-0x0000000007330000-0x0000000007340000-memory.dmp
                Filesize

                64KB

              • memory/4868-149-0x0000000000C20000-0x0000000000C2A000-memory.dmp
                Filesize

                40KB