Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2023 22:23

General

  • Target

    c579c573966f5346ef7e7432b042ae185a6eb3ef43eb2fea11280600a2b7e447.exe

  • Size

    1.0MB

  • MD5

    cd45a18536fbedce8eb4d1d979fb78a9

  • SHA1

    e1591e4b18e897ac4f2781f50603264ed5f0bfe0

  • SHA256

    c579c573966f5346ef7e7432b042ae185a6eb3ef43eb2fea11280600a2b7e447

  • SHA512

    5f7f4d57685125ae4903d7d5cb700c3afd2952f4a84210210f983f3392854486da2d4ccd31426104b505bd5c77fab4573578a2770b6601c89f90946bb142f328

  • SSDEEP

    24576:1yJ3T0aUczlO4abpPQjZSTULkVDhs0CdlRk9r0uvqFVnFeH:QJdBwPwSTULkpC0CdDkJLqFZ

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

barak

C2

193.233.20.32:4125

Attributes
  • auth_value

    a4c04941a9b0e99f503a698bbc21f25a

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c579c573966f5346ef7e7432b042ae185a6eb3ef43eb2fea11280600a2b7e447.exe
    "C:\Users\Admin\AppData\Local\Temp\c579c573966f5346ef7e7432b042ae185a6eb3ef43eb2fea11280600a2b7e447.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9287.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9287.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8142.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8142.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1025.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1025.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:856
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu018488.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu018488.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:228
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8714.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8714.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4268
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 1080
              6⤵
              • Program crash
              PID:4584
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSZ42s10.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSZ42s10.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1304
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 1352
            5⤵
            • Program crash
            PID:4224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en787142.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en787142.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge493606.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge493606.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4564
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4724
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4464
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3820
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1812
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:2044
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3304
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3908
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:2520
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4812
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4268 -ip 4268
                1⤵
                  PID:400
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1304 -ip 1304
                  1⤵
                    PID:3776
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1640
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3404

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    c42f36b603d001fa39f9d0bceeb8907e

                    SHA1

                    f6825be1492b596a9e752675db52d1556e44f0b0

                    SHA256

                    f517f5806958051bc6dfbd3b3eeb3d6fd5d5598d6ea50bd886a7f21a086598c7

                    SHA512

                    bfbfe99b14cc5463406992b87f69ea21d0b80062dd335a2eda180b4ec12d9bc7bad0e356659f702a815a198e46bd76545cf2b092df98102076eabc1acf8ff281

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    c42f36b603d001fa39f9d0bceeb8907e

                    SHA1

                    f6825be1492b596a9e752675db52d1556e44f0b0

                    SHA256

                    f517f5806958051bc6dfbd3b3eeb3d6fd5d5598d6ea50bd886a7f21a086598c7

                    SHA512

                    bfbfe99b14cc5463406992b87f69ea21d0b80062dd335a2eda180b4ec12d9bc7bad0e356659f702a815a198e46bd76545cf2b092df98102076eabc1acf8ff281

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    c42f36b603d001fa39f9d0bceeb8907e

                    SHA1

                    f6825be1492b596a9e752675db52d1556e44f0b0

                    SHA256

                    f517f5806958051bc6dfbd3b3eeb3d6fd5d5598d6ea50bd886a7f21a086598c7

                    SHA512

                    bfbfe99b14cc5463406992b87f69ea21d0b80062dd335a2eda180b4ec12d9bc7bad0e356659f702a815a198e46bd76545cf2b092df98102076eabc1acf8ff281

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    c42f36b603d001fa39f9d0bceeb8907e

                    SHA1

                    f6825be1492b596a9e752675db52d1556e44f0b0

                    SHA256

                    f517f5806958051bc6dfbd3b3eeb3d6fd5d5598d6ea50bd886a7f21a086598c7

                    SHA512

                    bfbfe99b14cc5463406992b87f69ea21d0b80062dd335a2eda180b4ec12d9bc7bad0e356659f702a815a198e46bd76545cf2b092df98102076eabc1acf8ff281

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    c42f36b603d001fa39f9d0bceeb8907e

                    SHA1

                    f6825be1492b596a9e752675db52d1556e44f0b0

                    SHA256

                    f517f5806958051bc6dfbd3b3eeb3d6fd5d5598d6ea50bd886a7f21a086598c7

                    SHA512

                    bfbfe99b14cc5463406992b87f69ea21d0b80062dd335a2eda180b4ec12d9bc7bad0e356659f702a815a198e46bd76545cf2b092df98102076eabc1acf8ff281

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge493606.exe

                    Filesize

                    226KB

                    MD5

                    c42f36b603d001fa39f9d0bceeb8907e

                    SHA1

                    f6825be1492b596a9e752675db52d1556e44f0b0

                    SHA256

                    f517f5806958051bc6dfbd3b3eeb3d6fd5d5598d6ea50bd886a7f21a086598c7

                    SHA512

                    bfbfe99b14cc5463406992b87f69ea21d0b80062dd335a2eda180b4ec12d9bc7bad0e356659f702a815a198e46bd76545cf2b092df98102076eabc1acf8ff281

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge493606.exe

                    Filesize

                    226KB

                    MD5

                    c42f36b603d001fa39f9d0bceeb8907e

                    SHA1

                    f6825be1492b596a9e752675db52d1556e44f0b0

                    SHA256

                    f517f5806958051bc6dfbd3b3eeb3d6fd5d5598d6ea50bd886a7f21a086598c7

                    SHA512

                    bfbfe99b14cc5463406992b87f69ea21d0b80062dd335a2eda180b4ec12d9bc7bad0e356659f702a815a198e46bd76545cf2b092df98102076eabc1acf8ff281

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9287.exe

                    Filesize

                    854KB

                    MD5

                    1e19992502630204991cc623f59901ee

                    SHA1

                    eaf93646f68754d9eca28c5f22a10325b46893a8

                    SHA256

                    3549544cc1d5c470c2db0608293f48b690db0aff4170a51a1e378944c115f0a7

                    SHA512

                    f4d7abef7ef954cc7b5a1e0f32147f9db966a3ae0dc039cb1e1a8c74a71a93339087ac1b8947f5f2def0e9bc41bd97617b2d5cbbcfe6857291acc3b3ee9f7a64

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9287.exe

                    Filesize

                    854KB

                    MD5

                    1e19992502630204991cc623f59901ee

                    SHA1

                    eaf93646f68754d9eca28c5f22a10325b46893a8

                    SHA256

                    3549544cc1d5c470c2db0608293f48b690db0aff4170a51a1e378944c115f0a7

                    SHA512

                    f4d7abef7ef954cc7b5a1e0f32147f9db966a3ae0dc039cb1e1a8c74a71a93339087ac1b8947f5f2def0e9bc41bd97617b2d5cbbcfe6857291acc3b3ee9f7a64

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en787142.exe

                    Filesize

                    175KB

                    MD5

                    27f639f83419dbe57beae7560a7f2e59

                    SHA1

                    0957d28fb8a9879add3b4d734218d79f23cbc254

                    SHA256

                    1e63ac49099bad1927002be8264e847d62568b5d91bfcae07430f3c11c870dce

                    SHA512

                    b8a522aaf39e18e6db52a0078f99ea59a98e270f4a545a479fcf72b9b777ee49e40fb31374b28f6ee829d4c88eec8a8f648dcb7fb792b1b0f256e5cec9f48b80

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en787142.exe

                    Filesize

                    175KB

                    MD5

                    27f639f83419dbe57beae7560a7f2e59

                    SHA1

                    0957d28fb8a9879add3b4d734218d79f23cbc254

                    SHA256

                    1e63ac49099bad1927002be8264e847d62568b5d91bfcae07430f3c11c870dce

                    SHA512

                    b8a522aaf39e18e6db52a0078f99ea59a98e270f4a545a479fcf72b9b777ee49e40fb31374b28f6ee829d4c88eec8a8f648dcb7fb792b1b0f256e5cec9f48b80

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8142.exe

                    Filesize

                    712KB

                    MD5

                    f5d24d23e4c1f8f78e0767182af12ec2

                    SHA1

                    5a813f37f8e40ae8f9348fe365d4de17756d4125

                    SHA256

                    985c9902678f1560102e7ab58e04ee779169ff9ac1af432cef5ea73c69a6256d

                    SHA512

                    b790d2261c00bf141b42183981c40c4e9420594d9ee7f7ab0e64bcc0d7e68bb8597490220dbe07a8a81288fea7b1f168856d93674b4044ac03422dc60129aa4d

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8142.exe

                    Filesize

                    712KB

                    MD5

                    f5d24d23e4c1f8f78e0767182af12ec2

                    SHA1

                    5a813f37f8e40ae8f9348fe365d4de17756d4125

                    SHA256

                    985c9902678f1560102e7ab58e04ee779169ff9ac1af432cef5ea73c69a6256d

                    SHA512

                    b790d2261c00bf141b42183981c40c4e9420594d9ee7f7ab0e64bcc0d7e68bb8597490220dbe07a8a81288fea7b1f168856d93674b4044ac03422dc60129aa4d

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSZ42s10.exe

                    Filesize

                    383KB

                    MD5

                    dde99068ecbfd563c4c1edb697b80592

                    SHA1

                    abb07591d78cb4bccf3cd6999cfc2b88eeecee39

                    SHA256

                    620600cf75dbc4ebe4eaee3510d8486c71acd7f1f672e77ec79600dcc6a6da25

                    SHA512

                    5e8c5eaa503c6ac1909dbfc9410dd4c6214312b87ee1f110f3de5feb993323338af5ac368d48c7889cde86bd6255fc98bb03ff226c74a34e893fb0439eee6f85

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSZ42s10.exe

                    Filesize

                    383KB

                    MD5

                    dde99068ecbfd563c4c1edb697b80592

                    SHA1

                    abb07591d78cb4bccf3cd6999cfc2b88eeecee39

                    SHA256

                    620600cf75dbc4ebe4eaee3510d8486c71acd7f1f672e77ec79600dcc6a6da25

                    SHA512

                    5e8c5eaa503c6ac1909dbfc9410dd4c6214312b87ee1f110f3de5feb993323338af5ac368d48c7889cde86bd6255fc98bb03ff226c74a34e893fb0439eee6f85

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1025.exe

                    Filesize

                    352KB

                    MD5

                    c06b251bbe8cc658af80c51ce798de56

                    SHA1

                    0ded710ed57ef770072ba98db1a7d5b2c274c7d8

                    SHA256

                    72165a48ac33291023d1e1423c6860f32052ddc88665504c98b81c19cba3ed47

                    SHA512

                    ce0d719367563fe9c5996fafa025f1c85e8a70eac3cb88a6119261e2755ddbff8d3b13c4c4e611764e042d9336ecafe401d3b909703a05c45ec91cecc61fb23e

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1025.exe

                    Filesize

                    352KB

                    MD5

                    c06b251bbe8cc658af80c51ce798de56

                    SHA1

                    0ded710ed57ef770072ba98db1a7d5b2c274c7d8

                    SHA256

                    72165a48ac33291023d1e1423c6860f32052ddc88665504c98b81c19cba3ed47

                    SHA512

                    ce0d719367563fe9c5996fafa025f1c85e8a70eac3cb88a6119261e2755ddbff8d3b13c4c4e611764e042d9336ecafe401d3b909703a05c45ec91cecc61fb23e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu018488.exe

                    Filesize

                    11KB

                    MD5

                    fcba57eb912a7429130882cf3940ccfb

                    SHA1

                    0af826f6a222e0033524f0dab2b1c60d53779def

                    SHA256

                    fbcd91c7e4806d9d688704776587472211b8a4ed797a19635ea396346ed8307b

                    SHA512

                    81103e327c575d6373b45e68b48aaa24d3ddab2d736e484a75f54f7a594b9fb8b574f2a47e1ac553c8f0f3d8d608118406d6dc41aa20e8817b94e969dae8e4a6

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu018488.exe

                    Filesize

                    11KB

                    MD5

                    fcba57eb912a7429130882cf3940ccfb

                    SHA1

                    0af826f6a222e0033524f0dab2b1c60d53779def

                    SHA256

                    fbcd91c7e4806d9d688704776587472211b8a4ed797a19635ea396346ed8307b

                    SHA512

                    81103e327c575d6373b45e68b48aaa24d3ddab2d736e484a75f54f7a594b9fb8b574f2a47e1ac553c8f0f3d8d608118406d6dc41aa20e8817b94e969dae8e4a6

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8714.exe

                    Filesize

                    325KB

                    MD5

                    1bf5913d6c12ce116535ed76fab8bdb6

                    SHA1

                    2a68497dc89123f90d97981d1a1869b3e5a67a35

                    SHA256

                    0bf5be46cc9ecef39fbfd901cbc5c6510748674b722e825b6f04817bd3c24037

                    SHA512

                    7dd729c44fd3d8da323bcddda618c334c4807cbeeef91bdabc837712083af3656c3ce5c9b8d2bee783add2dd678a28987356b71820e3239097fc7bb4ee8f2674

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8714.exe

                    Filesize

                    325KB

                    MD5

                    1bf5913d6c12ce116535ed76fab8bdb6

                    SHA1

                    2a68497dc89123f90d97981d1a1869b3e5a67a35

                    SHA256

                    0bf5be46cc9ecef39fbfd901cbc5c6510748674b722e825b6f04817bd3c24037

                    SHA512

                    7dd729c44fd3d8da323bcddda618c334c4807cbeeef91bdabc837712083af3656c3ce5c9b8d2bee783add2dd678a28987356b71820e3239097fc7bb4ee8f2674

                  • memory/228-161-0x00000000006B0000-0x00000000006BA000-memory.dmp

                    Filesize

                    40KB

                  • memory/1304-1124-0x0000000008280000-0x0000000008312000-memory.dmp

                    Filesize

                    584KB

                  • memory/1304-237-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-1133-0x00000000071E0000-0x00000000071F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1304-1132-0x0000000008E10000-0x000000000933C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/1304-1131-0x0000000008C20000-0x0000000008DE2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/1304-1130-0x0000000008AB0000-0x0000000008B00000-memory.dmp

                    Filesize

                    320KB

                  • memory/1304-1129-0x0000000008A10000-0x0000000008A86000-memory.dmp

                    Filesize

                    472KB

                  • memory/1304-1128-0x00000000071E0000-0x00000000071F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1304-1127-0x00000000071E0000-0x00000000071F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1304-1126-0x00000000071E0000-0x00000000071F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1304-1125-0x0000000008320000-0x0000000008386000-memory.dmp

                    Filesize

                    408KB

                  • memory/1304-1122-0x00000000071E0000-0x00000000071F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1304-1121-0x0000000007F90000-0x0000000007FCC000-memory.dmp

                    Filesize

                    240KB

                  • memory/1304-1120-0x0000000007F70000-0x0000000007F82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1304-208-0x0000000002D60000-0x0000000002DAB000-memory.dmp

                    Filesize

                    300KB

                  • memory/1304-210-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-209-0x00000000071E0000-0x00000000071F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1304-213-0x00000000071E0000-0x00000000071F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1304-212-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-211-0x00000000071E0000-0x00000000071F0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1304-215-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-217-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-219-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-221-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-225-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-223-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-227-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-229-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-231-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-233-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-235-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-1119-0x0000000007E30000-0x0000000007F3A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/1304-239-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-241-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-243-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-245-0x0000000007140000-0x000000000717F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1304-1118-0x00000000077A0000-0x0000000007DB8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/1696-1139-0x0000000000C50000-0x0000000000C82000-memory.dmp

                    Filesize

                    200KB

                  • memory/1696-1140-0x00000000057F0000-0x0000000005800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4268-192-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-167-0x0000000002C50000-0x0000000002C7D000-memory.dmp

                    Filesize

                    180KB

                  • memory/4268-188-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-202-0x0000000007200000-0x0000000007210000-memory.dmp

                    Filesize

                    64KB

                  • memory/4268-201-0x0000000007200000-0x0000000007210000-memory.dmp

                    Filesize

                    64KB

                  • memory/4268-199-0x0000000000400000-0x0000000002B7E000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/4268-198-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-195-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-196-0x0000000007200000-0x0000000007210000-memory.dmp

                    Filesize

                    64KB

                  • memory/4268-180-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-182-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-203-0x0000000000400000-0x0000000002B7E000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/4268-194-0x0000000007200000-0x0000000007210000-memory.dmp

                    Filesize

                    64KB

                  • memory/4268-178-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-186-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-184-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-176-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-174-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-170-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-172-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-169-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4268-168-0x0000000007210000-0x00000000077B4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4268-190-0x00000000070E0000-0x00000000070F2000-memory.dmp

                    Filesize

                    72KB