Analysis

  • max time kernel
    103s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 01:22

General

  • Target

    474b3d494f5ea4d9b1d28fa743ca2d7a4d8a1047f32b02a84079e27b43865a06.exe

  • Size

    1023KB

  • MD5

    82caed81e2ba19204a51269f7526c758

  • SHA1

    3b52a2b472b1675c781e2d879e5d18f2e4fc4461

  • SHA256

    474b3d494f5ea4d9b1d28fa743ca2d7a4d8a1047f32b02a84079e27b43865a06

  • SHA512

    b01a0e20cc8a369e0a6c0befe28fc6f9485a6eafb6e2ceb1812d0ecbcf845c26596fc1c278cc77964765970197c959c9894a04d25a6cf07e31608e49ca306236

  • SSDEEP

    12288:8Mruy90T6MRWxzGeQGjnKcBhpk4XVYPAFJC40sDdda3ygthBL7MBtLMwEZaRQUsa:ayX7Q8N04XosJC40sRMxqHM0QUsCTX

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

trap

C2

193.233.20.30:4125

Attributes
  • auth_value

    b39a737e2e9eba88e48ab88d1061be9c

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\474b3d494f5ea4d9b1d28fa743ca2d7a4d8a1047f32b02a84079e27b43865a06.exe
    "C:\Users\Admin\AppData\Local\Temp\474b3d494f5ea4d9b1d28fa743ca2d7a4d8a1047f32b02a84079e27b43865a06.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4173.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4173.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9539.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9539.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:868
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6628.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6628.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:688
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9826.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9826.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3528
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6821.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6821.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2176
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 1080
              6⤵
              • Program crash
              PID:1128
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dci38s61.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dci38s61.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4844
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 1336
            5⤵
            • Program crash
            PID:4180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en907266.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en907266.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258056.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258056.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4800
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2644
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4636
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4480
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4444
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:2840
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1408
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4624
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:1680
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2176 -ip 2176
                1⤵
                  PID:1292
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4844 -ip 4844
                  1⤵
                    PID:1288
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1172

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Scheduled Task

                  1
                  T1053

                  Persistence

                  Modify Existing Service

                  1
                  T1031

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Scheduled Task

                  1
                  T1053

                  Privilege Escalation

                  Scheduled Task

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  3
                  T1112

                  Disabling Security Tools

                  2
                  T1089

                  Credential Access

                  Credentials in Files

                  2
                  T1081

                  Discovery

                  Query Registry

                  2
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Collection

                  Data from Local System

                  2
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258056.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258056.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4173.exe
                    Filesize

                    841KB

                    MD5

                    7286aa686e594b1090cd97a9e5afe4d3

                    SHA1

                    a5ab75a9f2538b5970a522c164f4dd1d370fb4ff

                    SHA256

                    255b2995a96cb1c3a4785574d643a6e16326ac11bb35f777e7707ed1f6ced076

                    SHA512

                    ac9bf9feec60b97a84cfd57cf12c25aaf3e66af784448a46ac34c9db6eba177621545b88b7c1944c49f0acae9449c2b4164a47659af209d69e432b549f406a04

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4173.exe
                    Filesize

                    841KB

                    MD5

                    7286aa686e594b1090cd97a9e5afe4d3

                    SHA1

                    a5ab75a9f2538b5970a522c164f4dd1d370fb4ff

                    SHA256

                    255b2995a96cb1c3a4785574d643a6e16326ac11bb35f777e7707ed1f6ced076

                    SHA512

                    ac9bf9feec60b97a84cfd57cf12c25aaf3e66af784448a46ac34c9db6eba177621545b88b7c1944c49f0acae9449c2b4164a47659af209d69e432b549f406a04

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en907266.exe
                    Filesize

                    175KB

                    MD5

                    581e8f97deca3769f1bc14882c9f26dc

                    SHA1

                    b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                    SHA256

                    b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                    SHA512

                    f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en907266.exe
                    Filesize

                    175KB

                    MD5

                    581e8f97deca3769f1bc14882c9f26dc

                    SHA1

                    b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                    SHA256

                    b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                    SHA512

                    f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9539.exe
                    Filesize

                    699KB

                    MD5

                    8b97cbcc8425fd04d2df48ffdc55401d

                    SHA1

                    2d00c26fbd8029870e04271d2fed1df6bd0b090b

                    SHA256

                    5e3270ab84dc98b0bc09759477b31452283fa2b223c999cc71e670df8008155b

                    SHA512

                    c9a9c6631b47ef8ae825b63a813c95d3a57d5efd68f2c6ff2b110251e01ada96b4518bd2c599c0a036c2592b9c0a51f4335a34a3e0d9520eb9d2774ccb8b7139

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9539.exe
                    Filesize

                    699KB

                    MD5

                    8b97cbcc8425fd04d2df48ffdc55401d

                    SHA1

                    2d00c26fbd8029870e04271d2fed1df6bd0b090b

                    SHA256

                    5e3270ab84dc98b0bc09759477b31452283fa2b223c999cc71e670df8008155b

                    SHA512

                    c9a9c6631b47ef8ae825b63a813c95d3a57d5efd68f2c6ff2b110251e01ada96b4518bd2c599c0a036c2592b9c0a51f4335a34a3e0d9520eb9d2774ccb8b7139

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dci38s61.exe
                    Filesize

                    358KB

                    MD5

                    d2230bbeff7f89a0c2aab8d5e4f9d73d

                    SHA1

                    8bad95211e401066708abc27ba26b05b86695ea2

                    SHA256

                    d1460bf62c7eda478dedf8fe182acb1ef577e4860bb9e806995bf6f0d966856d

                    SHA512

                    ed4e0161784e6c78318a21aa928dc2d6d3728079ef1ef8ce13aaf59942a36f0cc88d441f0c2335a7c75b9f3eea4df18bbd13acdbd890b5fd2b7ee39d59a3b9d2

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dci38s61.exe
                    Filesize

                    358KB

                    MD5

                    d2230bbeff7f89a0c2aab8d5e4f9d73d

                    SHA1

                    8bad95211e401066708abc27ba26b05b86695ea2

                    SHA256

                    d1460bf62c7eda478dedf8fe182acb1ef577e4860bb9e806995bf6f0d966856d

                    SHA512

                    ed4e0161784e6c78318a21aa928dc2d6d3728079ef1ef8ce13aaf59942a36f0cc88d441f0c2335a7c75b9f3eea4df18bbd13acdbd890b5fd2b7ee39d59a3b9d2

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6628.exe
                    Filesize

                    346KB

                    MD5

                    abfa7b3096994bb06ab5db047b36d032

                    SHA1

                    23d6aeaead6d582d5c547935ce7af61356d772e0

                    SHA256

                    0b96d5e9afbfb74dbde12baf4e55ff3fa79004a6b368b38243a32308bce4ee38

                    SHA512

                    41fa8b868327b7dc2e00238ed84d67bcfb93d32e6ef06476f3908a90c7bf1fb294720814d387eaadf16ce04758ce303aea8345ced8d3744a5cdd25417071abcc

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6628.exe
                    Filesize

                    346KB

                    MD5

                    abfa7b3096994bb06ab5db047b36d032

                    SHA1

                    23d6aeaead6d582d5c547935ce7af61356d772e0

                    SHA256

                    0b96d5e9afbfb74dbde12baf4e55ff3fa79004a6b368b38243a32308bce4ee38

                    SHA512

                    41fa8b868327b7dc2e00238ed84d67bcfb93d32e6ef06476f3908a90c7bf1fb294720814d387eaadf16ce04758ce303aea8345ced8d3744a5cdd25417071abcc

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9826.exe
                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus9826.exe
                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6821.exe
                    Filesize

                    300KB

                    MD5

                    7b76a5b70705d1013e3d680df449b79c

                    SHA1

                    a11fbbdf9341fc6f7cb498d315fcaac58a1653a3

                    SHA256

                    bed81d58e8ad2cbe74a97f60924da6b447eae282b60804cb6c21e878414396fb

                    SHA512

                    fb446a0a6146dc5dc3f83fb36b496b4fdd0ae267921cffce7806e56c32de0c8ae79822ae3ee856d1a5b50673549d32f434c79b2e5bb46c400d7c12d101a00d18

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6821.exe
                    Filesize

                    300KB

                    MD5

                    7b76a5b70705d1013e3d680df449b79c

                    SHA1

                    a11fbbdf9341fc6f7cb498d315fcaac58a1653a3

                    SHA256

                    bed81d58e8ad2cbe74a97f60924da6b447eae282b60804cb6c21e878414396fb

                    SHA512

                    fb446a0a6146dc5dc3f83fb36b496b4fdd0ae267921cffce7806e56c32de0c8ae79822ae3ee856d1a5b50673549d32f434c79b2e5bb46c400d7c12d101a00d18

                  • memory/1964-1140-0x0000000005690000-0x00000000056A0000-memory.dmp
                    Filesize

                    64KB

                  • memory/1964-1139-0x0000000000DC0000-0x0000000000DF2000-memory.dmp
                    Filesize

                    200KB

                  • memory/2176-178-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-201-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
                    Filesize

                    64KB

                  • memory/2176-182-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-184-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-186-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-188-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-190-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-192-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-194-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-196-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-198-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-199-0x0000000000400000-0x000000000070E000-memory.dmp
                    Filesize

                    3.1MB

                  • memory/2176-200-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
                    Filesize

                    64KB

                  • memory/2176-180-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-202-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
                    Filesize

                    64KB

                  • memory/2176-204-0x0000000000400000-0x000000000070E000-memory.dmp
                    Filesize

                    3.1MB

                  • memory/2176-167-0x0000000004EF0000-0x0000000005494000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/2176-176-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-174-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-172-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-171-0x0000000002830000-0x0000000002842000-memory.dmp
                    Filesize

                    72KB

                  • memory/2176-170-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
                    Filesize

                    64KB

                  • memory/2176-169-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
                    Filesize

                    64KB

                  • memory/2176-168-0x00000000007A0000-0x00000000007CD000-memory.dmp
                    Filesize

                    180KB

                  • memory/3528-161-0x0000000000A10000-0x0000000000A1A000-memory.dmp
                    Filesize

                    40KB

                  • memory/4844-209-0x0000000000890000-0x00000000008DB000-memory.dmp
                    Filesize

                    300KB

                  • memory/4844-223-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-225-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-227-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-231-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-229-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-233-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-235-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-237-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-239-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-241-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-243-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-245-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-1118-0x0000000005410000-0x0000000005A28000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/4844-1119-0x0000000005A30000-0x0000000005B3A000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/4844-1120-0x0000000004E10000-0x0000000004E22000-memory.dmp
                    Filesize

                    72KB

                  • memory/4844-1121-0x0000000005B40000-0x0000000005B7C000-memory.dmp
                    Filesize

                    240KB

                  • memory/4844-1122-0x0000000004E50000-0x0000000004E60000-memory.dmp
                    Filesize

                    64KB

                  • memory/4844-1123-0x0000000005E10000-0x0000000005E76000-memory.dmp
                    Filesize

                    408KB

                  • memory/4844-1124-0x00000000064E0000-0x0000000006572000-memory.dmp
                    Filesize

                    584KB

                  • memory/4844-1125-0x0000000006810000-0x0000000006886000-memory.dmp
                    Filesize

                    472KB

                  • memory/4844-1126-0x0000000006890000-0x00000000068E0000-memory.dmp
                    Filesize

                    320KB

                  • memory/4844-1128-0x0000000004E50000-0x0000000004E60000-memory.dmp
                    Filesize

                    64KB

                  • memory/4844-1129-0x0000000004E50000-0x0000000004E60000-memory.dmp
                    Filesize

                    64KB

                  • memory/4844-1130-0x0000000004E50000-0x0000000004E60000-memory.dmp
                    Filesize

                    64KB

                  • memory/4844-1131-0x0000000006900000-0x0000000006AC2000-memory.dmp
                    Filesize

                    1.8MB

                  • memory/4844-221-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-219-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-217-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-215-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-213-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-212-0x0000000004D10000-0x0000000004D4E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4844-211-0x0000000004E50000-0x0000000004E60000-memory.dmp
                    Filesize

                    64KB

                  • memory/4844-210-0x0000000004E50000-0x0000000004E60000-memory.dmp
                    Filesize

                    64KB

                  • memory/4844-1132-0x0000000006AD0000-0x0000000006FFC000-memory.dmp
                    Filesize

                    5.2MB

                  • memory/4844-1133-0x0000000004E50000-0x0000000004E60000-memory.dmp
                    Filesize

                    64KB