Analysis

  • max time kernel
    122s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 11:22

General

  • Target

    8bf2a5ea15e7a3cc6c96ccb89615fe5eced93145da7a88776e7781abca687e80.exe

  • Size

    1008KB

  • MD5

    1e94efe9fc11c79891474d18eb4960c9

  • SHA1

    095bbbe47bcba1b427e114839a24cb646bd891b8

  • SHA256

    8bf2a5ea15e7a3cc6c96ccb89615fe5eced93145da7a88776e7781abca687e80

  • SHA512

    bb9f99e3c26e319956f32abeabc368de5f473627422cfc72387028c45ba2840b1293df1ce62f84bb58c09a2a29d09b4e166210869dd7ca4beee6da39f067a420

  • SSDEEP

    24576:WyLa3KzNiuLpkbRspShgy0u9nICWzLnC9L3K0b:l23KzZLpispShfD9ICWzbCVJ

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

volya

C2

193.233.20.31:4125

Attributes
  • auth_value

    0efc9f002a9fbeec5f8b8338141d546a

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bf2a5ea15e7a3cc6c96ccb89615fe5eced93145da7a88776e7781abca687e80.exe
    "C:\Users\Admin\AppData\Local\Temp\8bf2a5ea15e7a3cc6c96ccb89615fe5eced93145da7a88776e7781abca687e80.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9461.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9461.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5341.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5341.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1844
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4442.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4442.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4380
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5869.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5869.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1504
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8806.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8806.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:216
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 1084
              6⤵
              • Program crash
              PID:3548
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTw20s85.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTw20s85.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1416
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 1328
            5⤵
            • Program crash
            PID:3492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en320672.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en320672.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge218579.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge218579.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4760
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2348
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1048
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1100
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:3108
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4220
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3156
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4584
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4016
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 216 -ip 216
                1⤵
                  PID:4016
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1416 -ip 1416
                  1⤵
                    PID:3336
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:5032
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3896

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge218579.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge218579.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9461.exe

                    Filesize

                    826KB

                    MD5

                    c8dd4f825dd8e6071570a0f6701eba79

                    SHA1

                    8c3387bbcec0769cf5e46a37c6564b5adb3e7c13

                    SHA256

                    1d5d7c84d83f6bf9e582a935897acb8da832a319955d058baca0a85a07f2b21c

                    SHA512

                    f9eb67fc900ff788bc1c1b36b974d5bcfefbbba5efdfc1990e523d904d1d786e01a0a921cadaa7ed30cf2960fd7c31ce00459e8527290318d26a33015b9bf6ae

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9461.exe

                    Filesize

                    826KB

                    MD5

                    c8dd4f825dd8e6071570a0f6701eba79

                    SHA1

                    8c3387bbcec0769cf5e46a37c6564b5adb3e7c13

                    SHA256

                    1d5d7c84d83f6bf9e582a935897acb8da832a319955d058baca0a85a07f2b21c

                    SHA512

                    f9eb67fc900ff788bc1c1b36b974d5bcfefbbba5efdfc1990e523d904d1d786e01a0a921cadaa7ed30cf2960fd7c31ce00459e8527290318d26a33015b9bf6ae

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en320672.exe

                    Filesize

                    175KB

                    MD5

                    018b839c5ea1438099cd92f268570005

                    SHA1

                    5c962942d01b46556c5f3d88a51ab865c051418c

                    SHA256

                    593c354b3b09050c92d44a076a7a630a245790ab4fab6e872dbafd89e93cb132

                    SHA512

                    67d7a260d200127fe6a6c0dee2bfdd6f84f6bdf3778a8033ae0d51eee1cd717328dba6ee4aff07e4522466317e790f7cd94440fe31adca06269db3d279c31010

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en320672.exe

                    Filesize

                    175KB

                    MD5

                    018b839c5ea1438099cd92f268570005

                    SHA1

                    5c962942d01b46556c5f3d88a51ab865c051418c

                    SHA256

                    593c354b3b09050c92d44a076a7a630a245790ab4fab6e872dbafd89e93cb132

                    SHA512

                    67d7a260d200127fe6a6c0dee2bfdd6f84f6bdf3778a8033ae0d51eee1cd717328dba6ee4aff07e4522466317e790f7cd94440fe31adca06269db3d279c31010

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5341.exe

                    Filesize

                    684KB

                    MD5

                    3164aa916d5a7347e86d938c271615db

                    SHA1

                    506f1786cd1caaff585df4d3fd778432b8bef2bc

                    SHA256

                    c3c2cd70287198bcfb610b6f23d6e85243c700db51cd6f686b082a0427256c12

                    SHA512

                    bef9c74a5689b9b68825768ef14ff882bb86aa187c2517435c6972de01f9125b86de200d2784093736b41ba81323eab518952dd70df9d9584594c349c1ba0212

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5341.exe

                    Filesize

                    684KB

                    MD5

                    3164aa916d5a7347e86d938c271615db

                    SHA1

                    506f1786cd1caaff585df4d3fd778432b8bef2bc

                    SHA256

                    c3c2cd70287198bcfb610b6f23d6e85243c700db51cd6f686b082a0427256c12

                    SHA512

                    bef9c74a5689b9b68825768ef14ff882bb86aa187c2517435c6972de01f9125b86de200d2784093736b41ba81323eab518952dd70df9d9584594c349c1ba0212

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTw20s85.exe

                    Filesize

                    356KB

                    MD5

                    e1a69fcb5bbdf93d9fc4fbc4c1986216

                    SHA1

                    c38d278575b73ca7d2870a4b88c5bae1d98d1f1e

                    SHA256

                    52a3475c500844d47b39e33c11e1ebb750b59ef37963a8fc811b6f5992bb7c38

                    SHA512

                    e65cfb53029552b69131260a1df387014dd73dd175c924a3b6370e9ada5db34e0796dce505b968b0e8adec8fe5c91180bf2c78e45ae40fbfcac88b801f557c3a

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTw20s85.exe

                    Filesize

                    356KB

                    MD5

                    e1a69fcb5bbdf93d9fc4fbc4c1986216

                    SHA1

                    c38d278575b73ca7d2870a4b88c5bae1d98d1f1e

                    SHA256

                    52a3475c500844d47b39e33c11e1ebb750b59ef37963a8fc811b6f5992bb7c38

                    SHA512

                    e65cfb53029552b69131260a1df387014dd73dd175c924a3b6370e9ada5db34e0796dce505b968b0e8adec8fe5c91180bf2c78e45ae40fbfcac88b801f557c3a

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4442.exe

                    Filesize

                    338KB

                    MD5

                    c0fba8c8c1d2d98baba1120c36e86071

                    SHA1

                    c383a62c486a464d14d20bd2b33a832bba31356e

                    SHA256

                    edf89dfd1fd0367cd35695ec1c264199a471458d9f3df672fe123eb0a6f676ca

                    SHA512

                    30d10b7dc19e9c0dcb71621c05427b0667e2a936ab9de3a495eb69153d816a2b1519e004d43003dd321afac6142bae543d025e6a3ca9b6ac52e19d02b4741547

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4442.exe

                    Filesize

                    338KB

                    MD5

                    c0fba8c8c1d2d98baba1120c36e86071

                    SHA1

                    c383a62c486a464d14d20bd2b33a832bba31356e

                    SHA256

                    edf89dfd1fd0367cd35695ec1c264199a471458d9f3df672fe123eb0a6f676ca

                    SHA512

                    30d10b7dc19e9c0dcb71621c05427b0667e2a936ab9de3a495eb69153d816a2b1519e004d43003dd321afac6142bae543d025e6a3ca9b6ac52e19d02b4741547

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5869.exe

                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5869.exe

                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8806.exe

                    Filesize

                    298KB

                    MD5

                    ac3403e40787ce466b482a043baab838

                    SHA1

                    7740caba93951ba98b48b3827108f17cf08d3e80

                    SHA256

                    157f9c7773420417bb08dfc99bbbb12148b08e54a381e26ca3f5811a854e83bf

                    SHA512

                    a70f4a760d07f352a8a1dc52ed70c1eca9b7d5e9cc77fefaf1fafd650931b7fe5b3862aa3e513c8434beffb174f7a33ae5ed95c4fc8a7e3491d80e350619f312

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8806.exe

                    Filesize

                    298KB

                    MD5

                    ac3403e40787ce466b482a043baab838

                    SHA1

                    7740caba93951ba98b48b3827108f17cf08d3e80

                    SHA256

                    157f9c7773420417bb08dfc99bbbb12148b08e54a381e26ca3f5811a854e83bf

                    SHA512

                    a70f4a760d07f352a8a1dc52ed70c1eca9b7d5e9cc77fefaf1fafd650931b7fe5b3862aa3e513c8434beffb174f7a33ae5ed95c4fc8a7e3491d80e350619f312

                  • memory/216-180-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-199-0x00000000072F0000-0x0000000007300000-memory.dmp

                    Filesize

                    64KB

                  • memory/216-182-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-184-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-186-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-188-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-190-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-192-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-194-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-196-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-198-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-178-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-200-0x0000000000400000-0x0000000002B79000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/216-201-0x00000000072F0000-0x0000000007300000-memory.dmp

                    Filesize

                    64KB

                  • memory/216-203-0x00000000072F0000-0x0000000007300000-memory.dmp

                    Filesize

                    64KB

                  • memory/216-204-0x0000000000400000-0x0000000002B79000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/216-176-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-174-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-172-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-171-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/216-170-0x0000000007300000-0x00000000078A4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/216-169-0x00000000072F0000-0x0000000007300000-memory.dmp

                    Filesize

                    64KB

                  • memory/216-168-0x00000000072F0000-0x0000000007300000-memory.dmp

                    Filesize

                    64KB

                  • memory/216-167-0x0000000002C60000-0x0000000002C8D000-memory.dmp

                    Filesize

                    180KB

                  • memory/1416-217-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-1125-0x0000000008280000-0x0000000008312000-memory.dmp

                    Filesize

                    584KB

                  • memory/1416-227-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-229-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-231-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-235-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/1416-234-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/1416-237-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/1416-238-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-240-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-233-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-242-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-244-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-246-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-1119-0x00000000077D0000-0x0000000007DE8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/1416-1120-0x0000000007E30000-0x0000000007F3A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/1416-1121-0x0000000007F70000-0x0000000007F82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1416-1122-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/1416-1123-0x0000000007F90000-0x0000000007FCC000-memory.dmp

                    Filesize

                    240KB

                  • memory/1416-225-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-1126-0x0000000008320000-0x0000000008386000-memory.dmp

                    Filesize

                    408KB

                  • memory/1416-1127-0x0000000008A20000-0x0000000008A96000-memory.dmp

                    Filesize

                    472KB

                  • memory/1416-1128-0x0000000008AB0000-0x0000000008B00000-memory.dmp

                    Filesize

                    320KB

                  • memory/1416-1129-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/1416-1130-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/1416-1131-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/1416-1132-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/1416-1133-0x0000000008EE0000-0x00000000090A2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/1416-223-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-1134-0x00000000090B0000-0x00000000095DC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/1416-209-0x0000000002B90000-0x0000000002BDB000-memory.dmp

                    Filesize

                    300KB

                  • memory/1416-210-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-211-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-221-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-219-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-215-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1416-213-0x0000000007130000-0x000000000716E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1504-161-0x0000000000950000-0x000000000095A000-memory.dmp

                    Filesize

                    40KB

                  • memory/3084-1141-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3084-1140-0x00000000004E0000-0x0000000000512000-memory.dmp

                    Filesize

                    200KB