Analysis

  • max time kernel
    110s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2023, 21:28

General

  • Target

    97426907f48ccc315708b4688b1243d8606508d5478f96fd4f27ce49c855de3c.exe

  • Size

    1.0MB

  • MD5

    a5d256c83cdf672042c33fa225b6094f

  • SHA1

    674bdeca6e7b0b4779589561669dd7d69ac1997c

  • SHA256

    97426907f48ccc315708b4688b1243d8606508d5478f96fd4f27ce49c855de3c

  • SHA512

    81ffb34a1872aae8b09d132d9fec56c00f73aacc5f44e7e7b82a64e5a3d0ef3dd427c5e2555844188647ebff1e62e97de97e056b9b0fe9628b46764c1081571a

  • SSDEEP

    12288:CMrDy90gQ37El1HKjse0fl0fo2ZybVDibiIbGFM2MKezZ9lf6ijcTG+vIQnmxG84:1yrll1qF0fl0foFlIb2yKaZPciiDmF4

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

barak

C2

193.233.20.32:4125

Attributes
  • auth_value

    a4c04941a9b0e99f503a698bbc21f25a

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97426907f48ccc315708b4688b1243d8606508d5478f96fd4f27ce49c855de3c.exe
    "C:\Users\Admin\AppData\Local\Temp\97426907f48ccc315708b4688b1243d8606508d5478f96fd4f27ce49c855de3c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7591.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7591.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4529.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4529.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4272
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8773.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8773.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4648
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu226391.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu226391.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2932
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2250.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2250.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1692
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 1084
              6⤵
              • Program crash
              PID:3964
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlT23s00.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlT23s00.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4592
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 1360
            5⤵
            • Program crash
            PID:3028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en329644.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en329644.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge593031.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge593031.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4396
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:5036
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5024
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2932
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:3624
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:1128
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2224
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:3172
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:1952
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1692 -ip 1692
                1⤵
                  PID:4428
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4592 -ip 4592
                  1⤵
                    PID:1944
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2136

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    44dcf2714e4fb100cd6c89e19ede22ef

                    SHA1

                    094183556cb876dfc3567d2533960a8e89b2d707

                    SHA256

                    b428a245285309879d83dddbdc75eb27799fdcd2141a74843128bfabd765e994

                    SHA512

                    9028906ee99e869649b4f0a35041becc1d4943e83725565b723178505a2e482d00596234c3fe021269ae0d445cc85224e3300b4a009b29ed0198821a9f7f5e9e

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    44dcf2714e4fb100cd6c89e19ede22ef

                    SHA1

                    094183556cb876dfc3567d2533960a8e89b2d707

                    SHA256

                    b428a245285309879d83dddbdc75eb27799fdcd2141a74843128bfabd765e994

                    SHA512

                    9028906ee99e869649b4f0a35041becc1d4943e83725565b723178505a2e482d00596234c3fe021269ae0d445cc85224e3300b4a009b29ed0198821a9f7f5e9e

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    44dcf2714e4fb100cd6c89e19ede22ef

                    SHA1

                    094183556cb876dfc3567d2533960a8e89b2d707

                    SHA256

                    b428a245285309879d83dddbdc75eb27799fdcd2141a74843128bfabd765e994

                    SHA512

                    9028906ee99e869649b4f0a35041becc1d4943e83725565b723178505a2e482d00596234c3fe021269ae0d445cc85224e3300b4a009b29ed0198821a9f7f5e9e

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    44dcf2714e4fb100cd6c89e19ede22ef

                    SHA1

                    094183556cb876dfc3567d2533960a8e89b2d707

                    SHA256

                    b428a245285309879d83dddbdc75eb27799fdcd2141a74843128bfabd765e994

                    SHA512

                    9028906ee99e869649b4f0a35041becc1d4943e83725565b723178505a2e482d00596234c3fe021269ae0d445cc85224e3300b4a009b29ed0198821a9f7f5e9e

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge593031.exe

                    Filesize

                    226KB

                    MD5

                    44dcf2714e4fb100cd6c89e19ede22ef

                    SHA1

                    094183556cb876dfc3567d2533960a8e89b2d707

                    SHA256

                    b428a245285309879d83dddbdc75eb27799fdcd2141a74843128bfabd765e994

                    SHA512

                    9028906ee99e869649b4f0a35041becc1d4943e83725565b723178505a2e482d00596234c3fe021269ae0d445cc85224e3300b4a009b29ed0198821a9f7f5e9e

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge593031.exe

                    Filesize

                    226KB

                    MD5

                    44dcf2714e4fb100cd6c89e19ede22ef

                    SHA1

                    094183556cb876dfc3567d2533960a8e89b2d707

                    SHA256

                    b428a245285309879d83dddbdc75eb27799fdcd2141a74843128bfabd765e994

                    SHA512

                    9028906ee99e869649b4f0a35041becc1d4943e83725565b723178505a2e482d00596234c3fe021269ae0d445cc85224e3300b4a009b29ed0198821a9f7f5e9e

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7591.exe

                    Filesize

                    855KB

                    MD5

                    936fb9f28891b3632d9a17496c926425

                    SHA1

                    5e5576d1436883df0a866992295eada0c484c8f7

                    SHA256

                    ae8d574cccb99d13a529e2fd1a40a175013496756d619ab44987dafc247e13db

                    SHA512

                    0f93951176095b3b90e9dc57976cced10b215738361ec5536e7afa428eda65aa862924153428dbe385cae83ac5219197ef73f651496633e2f199abf6599a4ae7

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7591.exe

                    Filesize

                    855KB

                    MD5

                    936fb9f28891b3632d9a17496c926425

                    SHA1

                    5e5576d1436883df0a866992295eada0c484c8f7

                    SHA256

                    ae8d574cccb99d13a529e2fd1a40a175013496756d619ab44987dafc247e13db

                    SHA512

                    0f93951176095b3b90e9dc57976cced10b215738361ec5536e7afa428eda65aa862924153428dbe385cae83ac5219197ef73f651496633e2f199abf6599a4ae7

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en329644.exe

                    Filesize

                    175KB

                    MD5

                    99fb6397786c34c7d2388d71c434998d

                    SHA1

                    8fa156b49eb3dd31b1b213dcd994085fdcc17f4a

                    SHA256

                    4612d229124abd9da5bd617942e147361b0e6a9afb9cb581ffa497a257cc9777

                    SHA512

                    41380553010132ee0a3a41df51a87e122dbc2fb6c1f5ac0bd184757b3a8a5e5ef04f89779da9b385be295ba87e84cf18e00a111a6f745330965c288ea1cc4699

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en329644.exe

                    Filesize

                    175KB

                    MD5

                    99fb6397786c34c7d2388d71c434998d

                    SHA1

                    8fa156b49eb3dd31b1b213dcd994085fdcc17f4a

                    SHA256

                    4612d229124abd9da5bd617942e147361b0e6a9afb9cb581ffa497a257cc9777

                    SHA512

                    41380553010132ee0a3a41df51a87e122dbc2fb6c1f5ac0bd184757b3a8a5e5ef04f89779da9b385be295ba87e84cf18e00a111a6f745330965c288ea1cc4699

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4529.exe

                    Filesize

                    713KB

                    MD5

                    745bed27af841ccc9ffe440cc0e41310

                    SHA1

                    cfad0a5ab59261f9c64a9c88c3ef4498eb3366c1

                    SHA256

                    83eccda12032ee365f3ef94b6c691c990dad6eb2966f7afa13c92dc6fd04d22d

                    SHA512

                    4979de8d663c917924d6d20fb8f0966e5a666d35a4ff9f2301cbadb94acc7e82b34f2bef81bae758a4bcb3b77060052217b29cc31727e65da57a864eac9580f1

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina4529.exe

                    Filesize

                    713KB

                    MD5

                    745bed27af841ccc9ffe440cc0e41310

                    SHA1

                    cfad0a5ab59261f9c64a9c88c3ef4498eb3366c1

                    SHA256

                    83eccda12032ee365f3ef94b6c691c990dad6eb2966f7afa13c92dc6fd04d22d

                    SHA512

                    4979de8d663c917924d6d20fb8f0966e5a666d35a4ff9f2301cbadb94acc7e82b34f2bef81bae758a4bcb3b77060052217b29cc31727e65da57a864eac9580f1

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlT23s00.exe

                    Filesize

                    384KB

                    MD5

                    48984ce99fc7a94245e212a8f739ca75

                    SHA1

                    e9719710fd5fc9e554d9dc4737472f2ccf32e57c

                    SHA256

                    b68ba183d2b4eacb526b4fe29aa4b504f260d2b44f2a927c7628315bfa3af06b

                    SHA512

                    3d2fa7771637de44db467e7efd71675054699c9d5316329ec24f13c3defc2d72792260b066b69b7f5e6ab9b60d7a3c218e836e4d6bba0f47276c06e72bb0171a

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlT23s00.exe

                    Filesize

                    384KB

                    MD5

                    48984ce99fc7a94245e212a8f739ca75

                    SHA1

                    e9719710fd5fc9e554d9dc4737472f2ccf32e57c

                    SHA256

                    b68ba183d2b4eacb526b4fe29aa4b504f260d2b44f2a927c7628315bfa3af06b

                    SHA512

                    3d2fa7771637de44db467e7efd71675054699c9d5316329ec24f13c3defc2d72792260b066b69b7f5e6ab9b60d7a3c218e836e4d6bba0f47276c06e72bb0171a

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8773.exe

                    Filesize

                    353KB

                    MD5

                    82e1026851c247887d907498be8ee1fc

                    SHA1

                    768562eef7b7855f347364f76f28f4b5c6827bbf

                    SHA256

                    12b8ad8dbcecae1245dc47fcb03f5863bff84394ccca0c688c53c9aef201fec0

                    SHA512

                    3c7d5d7c8b4f54ff585b43d99e595f8bbf1ac8b56f2d8e0bb0e1fc564a81f0a5c6b6683a60b70c397a6e11bccf050be9944b267922753f0e0486585b5ed2ccc0

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8773.exe

                    Filesize

                    353KB

                    MD5

                    82e1026851c247887d907498be8ee1fc

                    SHA1

                    768562eef7b7855f347364f76f28f4b5c6827bbf

                    SHA256

                    12b8ad8dbcecae1245dc47fcb03f5863bff84394ccca0c688c53c9aef201fec0

                    SHA512

                    3c7d5d7c8b4f54ff585b43d99e595f8bbf1ac8b56f2d8e0bb0e1fc564a81f0a5c6b6683a60b70c397a6e11bccf050be9944b267922753f0e0486585b5ed2ccc0

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu226391.exe

                    Filesize

                    11KB

                    MD5

                    988d8f6803adf49c77a8da06f9d66a9b

                    SHA1

                    093af571974ffb1b2723b60f69d57e2ef14db1ed

                    SHA256

                    cdc58e073f544d7907c0f363dc47c6c18f92e5cb2be6ad27ab388cd34c69bb88

                    SHA512

                    f7c71a3cacb950fa3d1d1d7d87212c976d9a57bf46609642c1ba50c93a4aa431b8f6aebc0445959043c293d9d6dbcd136a087757f5b0989ae1090573119d02d6

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu226391.exe

                    Filesize

                    11KB

                    MD5

                    988d8f6803adf49c77a8da06f9d66a9b

                    SHA1

                    093af571974ffb1b2723b60f69d57e2ef14db1ed

                    SHA256

                    cdc58e073f544d7907c0f363dc47c6c18f92e5cb2be6ad27ab388cd34c69bb88

                    SHA512

                    f7c71a3cacb950fa3d1d1d7d87212c976d9a57bf46609642c1ba50c93a4aa431b8f6aebc0445959043c293d9d6dbcd136a087757f5b0989ae1090573119d02d6

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2250.exe

                    Filesize

                    325KB

                    MD5

                    76dbd231135febffe6bc7fb6563409ef

                    SHA1

                    f89c26a8c446d54a4245d6eb27b8032a6445a02a

                    SHA256

                    7553da01e1ecbfb2c477dd2aca98d278876eb0984fa0b5d7c9b8affa8501be05

                    SHA512

                    bb11b28e845dfd48d432a3fbfc4449bec260cfc279d320776a44ab6b694df7a0e09a7b7130f2ee11ebfbe5549433ebde9339671397bc813fbf11bc272ebccc4f

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2250.exe

                    Filesize

                    325KB

                    MD5

                    76dbd231135febffe6bc7fb6563409ef

                    SHA1

                    f89c26a8c446d54a4245d6eb27b8032a6445a02a

                    SHA256

                    7553da01e1ecbfb2c477dd2aca98d278876eb0984fa0b5d7c9b8affa8501be05

                    SHA512

                    bb11b28e845dfd48d432a3fbfc4449bec260cfc279d320776a44ab6b694df7a0e09a7b7130f2ee11ebfbe5549433ebde9339671397bc813fbf11bc272ebccc4f

                  • memory/1692-173-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-195-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-177-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-179-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-181-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-183-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-185-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-189-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-187-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-191-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-193-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-175-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-197-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-199-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-200-0x0000000000400000-0x0000000002B7E000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/1692-202-0x0000000000400000-0x0000000002B7E000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/1692-167-0x0000000002B80000-0x0000000002BAD000-memory.dmp

                    Filesize

                    180KB

                  • memory/1692-172-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1692-171-0x0000000007280000-0x0000000007824000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/1692-170-0x0000000007270000-0x0000000007280000-memory.dmp

                    Filesize

                    64KB

                  • memory/1692-169-0x0000000007270000-0x0000000007280000-memory.dmp

                    Filesize

                    64KB

                  • memory/1692-168-0x0000000007270000-0x0000000007280000-memory.dmp

                    Filesize

                    64KB

                  • memory/2932-161-0x0000000000620000-0x000000000062A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4592-210-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4592-1120-0x00000000080D0000-0x000000000810C000-memory.dmp

                    Filesize

                    240KB

                  • memory/4592-218-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-220-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-222-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-224-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-226-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-228-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-230-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-232-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-236-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-238-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-234-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-240-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-242-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-244-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-1117-0x0000000007950000-0x0000000007F68000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/4592-1118-0x0000000007F70000-0x000000000807A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/4592-1119-0x00000000080B0000-0x00000000080C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4592-216-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-1121-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4592-1123-0x00000000083C0000-0x0000000008452000-memory.dmp

                    Filesize

                    584KB

                  • memory/4592-1124-0x0000000008460000-0x00000000084C6000-memory.dmp

                    Filesize

                    408KB

                  • memory/4592-1125-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4592-1126-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4592-1127-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4592-1128-0x0000000008DC0000-0x0000000008E36000-memory.dmp

                    Filesize

                    472KB

                  • memory/4592-1129-0x0000000008E50000-0x0000000008EA0000-memory.dmp

                    Filesize

                    320KB

                  • memory/4592-1130-0x0000000008EB0000-0x0000000009072000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/4592-1131-0x0000000009090000-0x00000000095BC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/4592-1132-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4592-207-0x0000000002CB0000-0x0000000002CFB000-memory.dmp

                    Filesize

                    300KB

                  • memory/4592-209-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4592-214-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-212-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-211-0x0000000004B40000-0x0000000004B7F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4592-208-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4812-1139-0x0000000005140000-0x0000000005150000-memory.dmp

                    Filesize

                    64KB

                  • memory/4812-1138-0x0000000000800000-0x0000000000832000-memory.dmp

                    Filesize

                    200KB