Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2023, 10:07

General

  • Target

    file.exe

  • Size

    1.0MB

  • MD5

    d15b494deb7af4b4729fe4635d0ab1b7

  • SHA1

    d5ce77f909b98d391a1d302221635bfb29254ca7

  • SHA256

    d026a69e2dd47b25bf33b9a16aeca0aaced0993a9707a5ce91c3ed983461acac

  • SHA512

    d4b03375a153f711287b333340f0c5ada9b97dc76a3069ec63a6699f366bddbd86b688c2f4082ec08459a8f40de7c6b78faa8490f40a6befc89be58762ab5a96

  • SSDEEP

    24576:Fy7ABsQRptinpsYBwIQ/7gJPTI2CLFr2doY/PX47HcPewEU02o0cL:g6sQQpsAo/7OPTMLFrWoYXuHcPePU02I

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

stop

C2

193.233.20.32:4125

Attributes
  • auth_value

    5513676bfbd0dcf527a10a0484422896

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina0953.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina0953.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2935.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2935.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0381.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0381.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:392
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8204.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8204.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1404
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7489.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7489.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4660
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 1036
              6⤵
              • Program crash
              PID:3356
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGj37s22.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGj37s22.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5088
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 1336
            5⤵
            • Program crash
            PID:852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en294226.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en294226.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge992910.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge992910.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4588
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4680
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1236
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:436
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:2696
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4632
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1352
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4388
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:3728
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4660 -ip 4660
                1⤵
                  PID:4000
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5088 -ip 5088
                  1⤵
                    PID:2828
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1512
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4236

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    893b0c3685abf79a2f5a3a7afbfbbdce

                    SHA1

                    7e4ea4f7123248740392b981cbd4722a219c1f86

                    SHA256

                    1ee7041906d82eea6794ea8c21ea30db78916fe44d0345d7a1605b0b7023093a

                    SHA512

                    3b87f59c7f9145c6a46b663a1d2a06ab150ad3d562710776fcca58fcc4c7d8bc62ed48639d6e8c636fa728b7572b4b1c499911a72c94da27b78f534d1eae2e93

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    893b0c3685abf79a2f5a3a7afbfbbdce

                    SHA1

                    7e4ea4f7123248740392b981cbd4722a219c1f86

                    SHA256

                    1ee7041906d82eea6794ea8c21ea30db78916fe44d0345d7a1605b0b7023093a

                    SHA512

                    3b87f59c7f9145c6a46b663a1d2a06ab150ad3d562710776fcca58fcc4c7d8bc62ed48639d6e8c636fa728b7572b4b1c499911a72c94da27b78f534d1eae2e93

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    893b0c3685abf79a2f5a3a7afbfbbdce

                    SHA1

                    7e4ea4f7123248740392b981cbd4722a219c1f86

                    SHA256

                    1ee7041906d82eea6794ea8c21ea30db78916fe44d0345d7a1605b0b7023093a

                    SHA512

                    3b87f59c7f9145c6a46b663a1d2a06ab150ad3d562710776fcca58fcc4c7d8bc62ed48639d6e8c636fa728b7572b4b1c499911a72c94da27b78f534d1eae2e93

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    893b0c3685abf79a2f5a3a7afbfbbdce

                    SHA1

                    7e4ea4f7123248740392b981cbd4722a219c1f86

                    SHA256

                    1ee7041906d82eea6794ea8c21ea30db78916fe44d0345d7a1605b0b7023093a

                    SHA512

                    3b87f59c7f9145c6a46b663a1d2a06ab150ad3d562710776fcca58fcc4c7d8bc62ed48639d6e8c636fa728b7572b4b1c499911a72c94da27b78f534d1eae2e93

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    893b0c3685abf79a2f5a3a7afbfbbdce

                    SHA1

                    7e4ea4f7123248740392b981cbd4722a219c1f86

                    SHA256

                    1ee7041906d82eea6794ea8c21ea30db78916fe44d0345d7a1605b0b7023093a

                    SHA512

                    3b87f59c7f9145c6a46b663a1d2a06ab150ad3d562710776fcca58fcc4c7d8bc62ed48639d6e8c636fa728b7572b4b1c499911a72c94da27b78f534d1eae2e93

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge992910.exe

                    Filesize

                    226KB

                    MD5

                    893b0c3685abf79a2f5a3a7afbfbbdce

                    SHA1

                    7e4ea4f7123248740392b981cbd4722a219c1f86

                    SHA256

                    1ee7041906d82eea6794ea8c21ea30db78916fe44d0345d7a1605b0b7023093a

                    SHA512

                    3b87f59c7f9145c6a46b663a1d2a06ab150ad3d562710776fcca58fcc4c7d8bc62ed48639d6e8c636fa728b7572b4b1c499911a72c94da27b78f534d1eae2e93

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge992910.exe

                    Filesize

                    226KB

                    MD5

                    893b0c3685abf79a2f5a3a7afbfbbdce

                    SHA1

                    7e4ea4f7123248740392b981cbd4722a219c1f86

                    SHA256

                    1ee7041906d82eea6794ea8c21ea30db78916fe44d0345d7a1605b0b7023093a

                    SHA512

                    3b87f59c7f9145c6a46b663a1d2a06ab150ad3d562710776fcca58fcc4c7d8bc62ed48639d6e8c636fa728b7572b4b1c499911a72c94da27b78f534d1eae2e93

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina0953.exe

                    Filesize

                    855KB

                    MD5

                    2aa0c4a559bddce55b39eda33b7a1f95

                    SHA1

                    8260b798222acf1d39dbc9ee3139119a07978f31

                    SHA256

                    af1d0b2aebd2465597ac56eccddaef90b9b93260c1cdee0ce1abd2da32bd17b1

                    SHA512

                    3aebca204eae073ba8167e18c91f3af6116c410f8dbfa15a7a98889f052b6b2559f95cd68918ed4335f246dd9a4da7392947749be03c9c301670eccda33916cf

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina0953.exe

                    Filesize

                    855KB

                    MD5

                    2aa0c4a559bddce55b39eda33b7a1f95

                    SHA1

                    8260b798222acf1d39dbc9ee3139119a07978f31

                    SHA256

                    af1d0b2aebd2465597ac56eccddaef90b9b93260c1cdee0ce1abd2da32bd17b1

                    SHA512

                    3aebca204eae073ba8167e18c91f3af6116c410f8dbfa15a7a98889f052b6b2559f95cd68918ed4335f246dd9a4da7392947749be03c9c301670eccda33916cf

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en294226.exe

                    Filesize

                    175KB

                    MD5

                    4a2d849adde5ba0a3602ff5ece4755cf

                    SHA1

                    78bbc4fa270a98f63d231355a291ece7a4c527ba

                    SHA256

                    dbe281c2b053031b79ce5fd59a7151d414aae6e2d777bb5dfed501fb42387cac

                    SHA512

                    21d927adaa86d3253c073a0268cc2c604664323cd80befb9817730761c275493f7e61f90cf0018946529dda157df64315e4a61a0dd88b2bcdc4fe22d8004071f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en294226.exe

                    Filesize

                    175KB

                    MD5

                    4a2d849adde5ba0a3602ff5ece4755cf

                    SHA1

                    78bbc4fa270a98f63d231355a291ece7a4c527ba

                    SHA256

                    dbe281c2b053031b79ce5fd59a7151d414aae6e2d777bb5dfed501fb42387cac

                    SHA512

                    21d927adaa86d3253c073a0268cc2c604664323cd80befb9817730761c275493f7e61f90cf0018946529dda157df64315e4a61a0dd88b2bcdc4fe22d8004071f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2935.exe

                    Filesize

                    713KB

                    MD5

                    89c8204a1aaeb30f0f80eba13ecacfd1

                    SHA1

                    db89bd6b85112e29d434545a2563d032a6683c4d

                    SHA256

                    1615f33ab53737b72f294b209ee482f0b9ca10ace1e1d3a26cd9801f4585ce5a

                    SHA512

                    402485aa0dca45b19b46bb08775136566a10576d316f450a83d8677ede9fa10259f689cdf6318c8e636e24545d7090da58ac869e451f16721716b6ea0b3aa134

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2935.exe

                    Filesize

                    713KB

                    MD5

                    89c8204a1aaeb30f0f80eba13ecacfd1

                    SHA1

                    db89bd6b85112e29d434545a2563d032a6683c4d

                    SHA256

                    1615f33ab53737b72f294b209ee482f0b9ca10ace1e1d3a26cd9801f4585ce5a

                    SHA512

                    402485aa0dca45b19b46bb08775136566a10576d316f450a83d8677ede9fa10259f689cdf6318c8e636e24545d7090da58ac869e451f16721716b6ea0b3aa134

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGj37s22.exe

                    Filesize

                    385KB

                    MD5

                    868427aae4776a0782ae1f81462f92c8

                    SHA1

                    5ef0574220eb9190c045ee172e2bc0ae7c0979e8

                    SHA256

                    2110381f4216a026a99deab98396ef7e5b8b632cac39be9167047e461d755d4f

                    SHA512

                    f21c15ff5c8513c567b42fef6463727f8f53d85a1583bedfe1f90c889fd3e825e429d69770de53bfd0594ada1860912ebed95fba9b618b01e79d9478bcd6a5db

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGj37s22.exe

                    Filesize

                    385KB

                    MD5

                    868427aae4776a0782ae1f81462f92c8

                    SHA1

                    5ef0574220eb9190c045ee172e2bc0ae7c0979e8

                    SHA256

                    2110381f4216a026a99deab98396ef7e5b8b632cac39be9167047e461d755d4f

                    SHA512

                    f21c15ff5c8513c567b42fef6463727f8f53d85a1583bedfe1f90c889fd3e825e429d69770de53bfd0594ada1860912ebed95fba9b618b01e79d9478bcd6a5db

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0381.exe

                    Filesize

                    354KB

                    MD5

                    7725d428b8069840d5f15e13319f8783

                    SHA1

                    8b569b7e1e0e92077bda00de5e08baff93e17f92

                    SHA256

                    71103ffaae1a435575051e8b6f3ba48c67664fb4ff4304a771de77628d61dae6

                    SHA512

                    d74f0009244e278000d789eceb2f5b18f1b253349a8448252404f6009a9ffea85a6fd42cc6be6ca78dfeff6d16d5c2d6c4f5b7058027fe36a0af3167a3bb6f54

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0381.exe

                    Filesize

                    354KB

                    MD5

                    7725d428b8069840d5f15e13319f8783

                    SHA1

                    8b569b7e1e0e92077bda00de5e08baff93e17f92

                    SHA256

                    71103ffaae1a435575051e8b6f3ba48c67664fb4ff4304a771de77628d61dae6

                    SHA512

                    d74f0009244e278000d789eceb2f5b18f1b253349a8448252404f6009a9ffea85a6fd42cc6be6ca78dfeff6d16d5c2d6c4f5b7058027fe36a0af3167a3bb6f54

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8204.exe

                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8204.exe

                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7489.exe

                    Filesize

                    328KB

                    MD5

                    c3b2db77fbc59a0c56a6fc362348d4aa

                    SHA1

                    127ec2f4c7f537844a902396545da4a6d8d6bcf0

                    SHA256

                    2d2dec326fe78695f20add5bef2c2790ca006d1ab55286fce84727072d638cdf

                    SHA512

                    2a1740bc1e93ca86918ede16cbca26c3bc4c7a9f9ac202dcac1bfec6f58a4b1df332c1163bfa6af4fd6f6157f77e17ebdc47cd3b9ac0ac734bc915a34ce8876f

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7489.exe

                    Filesize

                    328KB

                    MD5

                    c3b2db77fbc59a0c56a6fc362348d4aa

                    SHA1

                    127ec2f4c7f537844a902396545da4a6d8d6bcf0

                    SHA256

                    2d2dec326fe78695f20add5bef2c2790ca006d1ab55286fce84727072d638cdf

                    SHA512

                    2a1740bc1e93ca86918ede16cbca26c3bc4c7a9f9ac202dcac1bfec6f58a4b1df332c1163bfa6af4fd6f6157f77e17ebdc47cd3b9ac0ac734bc915a34ce8876f

                  • memory/1404-161-0x00000000008D0000-0x00000000008DA000-memory.dmp

                    Filesize

                    40KB

                  • memory/2996-1142-0x0000000005690000-0x00000000056A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2996-1141-0x0000000000B00000-0x0000000000B32000-memory.dmp

                    Filesize

                    200KB

                  • memory/4660-173-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-203-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4660-183-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-191-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-193-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-195-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-197-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-199-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-189-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-187-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-181-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-200-0x0000000000400000-0x0000000002B7F000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/4660-202-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4660-185-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-204-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4660-205-0x0000000000400000-0x0000000002B7F000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/4660-179-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-177-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-172-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-175-0x0000000004B80000-0x0000000004B92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4660-171-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4660-170-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4660-169-0x0000000007290000-0x00000000072A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4660-168-0x0000000002C50000-0x0000000002C7D000-memory.dmp

                    Filesize

                    180KB

                  • memory/4660-167-0x00000000072A0000-0x0000000007844000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/5088-213-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-229-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-231-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-233-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-235-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-237-0x0000000002C60000-0x0000000002CAB000-memory.dmp

                    Filesize

                    300KB

                  • memory/5088-238-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-239-0x0000000004A70000-0x0000000004A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/5088-242-0x0000000004A70000-0x0000000004A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/5088-241-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-244-0x0000000004A70000-0x0000000004A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/5088-245-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-247-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-1120-0x0000000007790000-0x0000000007DA8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/5088-1121-0x0000000007E30000-0x0000000007F3A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/5088-1122-0x0000000007F70000-0x0000000007F82000-memory.dmp

                    Filesize

                    72KB

                  • memory/5088-1123-0x0000000007F90000-0x0000000007FCC000-memory.dmp

                    Filesize

                    240KB

                  • memory/5088-1124-0x0000000004A70000-0x0000000004A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/5088-1126-0x0000000004A70000-0x0000000004A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/5088-1127-0x0000000004A70000-0x0000000004A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/5088-1128-0x0000000004A70000-0x0000000004A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/5088-1129-0x0000000008280000-0x00000000082E6000-memory.dmp

                    Filesize

                    408KB

                  • memory/5088-1130-0x0000000008950000-0x00000000089E2000-memory.dmp

                    Filesize

                    584KB

                  • memory/5088-1131-0x0000000008A20000-0x0000000008A96000-memory.dmp

                    Filesize

                    472KB

                  • memory/5088-1132-0x0000000008AB0000-0x0000000008B00000-memory.dmp

                    Filesize

                    320KB

                  • memory/5088-1133-0x0000000008D60000-0x0000000008F22000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/5088-227-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-225-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-221-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-223-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-219-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-217-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-215-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-211-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-210-0x0000000007740000-0x000000000777F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5088-1134-0x0000000008F40000-0x000000000946C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/5088-1136-0x0000000004A70000-0x0000000004A80000-memory.dmp

                    Filesize

                    64KB