Analysis

  • max time kernel
    117s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:36

General

  • Target

    dabb9de07dd7474087ca0fa492bb10020dc44a46c81a726c3df6bb86fe73af8d.exe

  • Size

    1.0MB

  • MD5

    07a64d62ee6f7f5da74faf77754fd17c

  • SHA1

    7266d853bb2c3e859be14a7ed55a2c28275e89c4

  • SHA256

    dabb9de07dd7474087ca0fa492bb10020dc44a46c81a726c3df6bb86fe73af8d

  • SHA512

    b175b88f54df8e7ec481e8adaff8ac958bf7eaf876b30a5a33c2650caf107ac5801756292edca25df90a7fa33683827f5d7972664c8f41089daaf8e9ddb3caac

  • SSDEEP

    24576:HyA77F/DpRxLSyCVuBCCrRLm13on7N0UgL:SAXBlrL7guBCImAN0U

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dabb9de07dd7474087ca0fa492bb10020dc44a46c81a726c3df6bb86fe73af8d.exe
    "C:\Users\Admin\AppData\Local\Temp\dabb9de07dd7474087ca0fa492bb10020dc44a46c81a726c3df6bb86fe73af8d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2713.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2713.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9275.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9275.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4952
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7302.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7302.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu603856.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu603856.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1056
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0874.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0874.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1404
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 1080
              6⤵
              • Program crash
              PID:3324
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dMe33s42.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dMe33s42.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3744
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1348
            5⤵
            • Program crash
            PID:5012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en133309.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en133309.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge038713.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge038713.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:928
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1952
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3812
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:224
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4528
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4668
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3260
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4972
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:5116
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1404 -ip 1404
                1⤵
                  PID:4056
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3744 -ip 3744
                  1⤵
                    PID:5068
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1996
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:724

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    fabcdf1a43575ee0c46c93e990d59ab6

                    SHA1

                    9daed61a6eb1160b1370d9251e9aa5d21c3f668f

                    SHA256

                    673be13b416300a34a558d4d8ad6ab72952270c9b34b3d02b0d0294d0ee04d05

                    SHA512

                    9e8a0367875cd232ca93c78a6cfb737a3a05802958043dd116158e261c59c38de8ba1d42c06a22b0604d05ea7394a5563a58818cf9a57c0b5baf994e88419660

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    fabcdf1a43575ee0c46c93e990d59ab6

                    SHA1

                    9daed61a6eb1160b1370d9251e9aa5d21c3f668f

                    SHA256

                    673be13b416300a34a558d4d8ad6ab72952270c9b34b3d02b0d0294d0ee04d05

                    SHA512

                    9e8a0367875cd232ca93c78a6cfb737a3a05802958043dd116158e261c59c38de8ba1d42c06a22b0604d05ea7394a5563a58818cf9a57c0b5baf994e88419660

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    fabcdf1a43575ee0c46c93e990d59ab6

                    SHA1

                    9daed61a6eb1160b1370d9251e9aa5d21c3f668f

                    SHA256

                    673be13b416300a34a558d4d8ad6ab72952270c9b34b3d02b0d0294d0ee04d05

                    SHA512

                    9e8a0367875cd232ca93c78a6cfb737a3a05802958043dd116158e261c59c38de8ba1d42c06a22b0604d05ea7394a5563a58818cf9a57c0b5baf994e88419660

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    fabcdf1a43575ee0c46c93e990d59ab6

                    SHA1

                    9daed61a6eb1160b1370d9251e9aa5d21c3f668f

                    SHA256

                    673be13b416300a34a558d4d8ad6ab72952270c9b34b3d02b0d0294d0ee04d05

                    SHA512

                    9e8a0367875cd232ca93c78a6cfb737a3a05802958043dd116158e261c59c38de8ba1d42c06a22b0604d05ea7394a5563a58818cf9a57c0b5baf994e88419660

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    fabcdf1a43575ee0c46c93e990d59ab6

                    SHA1

                    9daed61a6eb1160b1370d9251e9aa5d21c3f668f

                    SHA256

                    673be13b416300a34a558d4d8ad6ab72952270c9b34b3d02b0d0294d0ee04d05

                    SHA512

                    9e8a0367875cd232ca93c78a6cfb737a3a05802958043dd116158e261c59c38de8ba1d42c06a22b0604d05ea7394a5563a58818cf9a57c0b5baf994e88419660

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge038713.exe

                    Filesize

                    227KB

                    MD5

                    fabcdf1a43575ee0c46c93e990d59ab6

                    SHA1

                    9daed61a6eb1160b1370d9251e9aa5d21c3f668f

                    SHA256

                    673be13b416300a34a558d4d8ad6ab72952270c9b34b3d02b0d0294d0ee04d05

                    SHA512

                    9e8a0367875cd232ca93c78a6cfb737a3a05802958043dd116158e261c59c38de8ba1d42c06a22b0604d05ea7394a5563a58818cf9a57c0b5baf994e88419660

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge038713.exe

                    Filesize

                    227KB

                    MD5

                    fabcdf1a43575ee0c46c93e990d59ab6

                    SHA1

                    9daed61a6eb1160b1370d9251e9aa5d21c3f668f

                    SHA256

                    673be13b416300a34a558d4d8ad6ab72952270c9b34b3d02b0d0294d0ee04d05

                    SHA512

                    9e8a0367875cd232ca93c78a6cfb737a3a05802958043dd116158e261c59c38de8ba1d42c06a22b0604d05ea7394a5563a58818cf9a57c0b5baf994e88419660

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2713.exe

                    Filesize

                    857KB

                    MD5

                    50f4933268b059b766083251690ee823

                    SHA1

                    bd9e668feb8d32f698e6f3ba6175ec6dd52b8e8a

                    SHA256

                    2258d861aca48fa5b35b544e990758f2425630a30ff6db8409801c5e19f394b9

                    SHA512

                    dc2b06a000c512e284bc966f86b00691947cbf30bba521000bd145d1b6e9782b3524182545540333609986a981d7d273dfc52b011941d994dea8898ceb16c549

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2713.exe

                    Filesize

                    857KB

                    MD5

                    50f4933268b059b766083251690ee823

                    SHA1

                    bd9e668feb8d32f698e6f3ba6175ec6dd52b8e8a

                    SHA256

                    2258d861aca48fa5b35b544e990758f2425630a30ff6db8409801c5e19f394b9

                    SHA512

                    dc2b06a000c512e284bc966f86b00691947cbf30bba521000bd145d1b6e9782b3524182545540333609986a981d7d273dfc52b011941d994dea8898ceb16c549

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en133309.exe

                    Filesize

                    175KB

                    MD5

                    d4b3f1ab245a7db3b9ce71c2d9fad145

                    SHA1

                    7c3a77e8c4fc36465d86b5df2c7ad8983cbb6b7d

                    SHA256

                    0b38c806be72fbfc11b6bdcf67b4d64bb0685ad6ee0e2c5df7ed978054797841

                    SHA512

                    b407ffbc65e10aa25446de36dccaf7f39fc6321fcb2dfc4773123cf4756ce89e169a69e56648202d996861a6cc748b99a8021cdb2c3ff0e4d298163d1d0e9491

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en133309.exe

                    Filesize

                    175KB

                    MD5

                    d4b3f1ab245a7db3b9ce71c2d9fad145

                    SHA1

                    7c3a77e8c4fc36465d86b5df2c7ad8983cbb6b7d

                    SHA256

                    0b38c806be72fbfc11b6bdcf67b4d64bb0685ad6ee0e2c5df7ed978054797841

                    SHA512

                    b407ffbc65e10aa25446de36dccaf7f39fc6321fcb2dfc4773123cf4756ce89e169a69e56648202d996861a6cc748b99a8021cdb2c3ff0e4d298163d1d0e9491

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9275.exe

                    Filesize

                    715KB

                    MD5

                    5a061bdebce57b8eaf5b0f5bdcb6c014

                    SHA1

                    86e07c17da96ac799ca2fb92d507f038dcd047dc

                    SHA256

                    2d72b12b7ed116b26a0489b9e64f0bcaffc31f7753ab2e35f339d80cdd7dde15

                    SHA512

                    66131499335f3239eeec7aec5949cb646bc16d7ddfe0c18acd6c45119a3de63600baf2a1b87a2deb505d725bf172c1769dfd72c8bd0f2af47506c21f1ac99a29

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9275.exe

                    Filesize

                    715KB

                    MD5

                    5a061bdebce57b8eaf5b0f5bdcb6c014

                    SHA1

                    86e07c17da96ac799ca2fb92d507f038dcd047dc

                    SHA256

                    2d72b12b7ed116b26a0489b9e64f0bcaffc31f7753ab2e35f339d80cdd7dde15

                    SHA512

                    66131499335f3239eeec7aec5949cb646bc16d7ddfe0c18acd6c45119a3de63600baf2a1b87a2deb505d725bf172c1769dfd72c8bd0f2af47506c21f1ac99a29

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dMe33s42.exe

                    Filesize

                    365KB

                    MD5

                    73e654a2a5b4af962838c43c1d863e3e

                    SHA1

                    5950224fc66a6374b45bacd3acdc918aa38757c9

                    SHA256

                    7f028a8edbc4949154bb5d298c1f2355b9f93348a291010183e7de0b2fbe120f

                    SHA512

                    fe16263bb171bf10a0bb47cde31333fa1d9aff54a243fd696cb3d329e64dd34d13063b3c36fda9c236e91c4f00e80e0f23435f44b59908518fd85c774b6ef967

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dMe33s42.exe

                    Filesize

                    365KB

                    MD5

                    73e654a2a5b4af962838c43c1d863e3e

                    SHA1

                    5950224fc66a6374b45bacd3acdc918aa38757c9

                    SHA256

                    7f028a8edbc4949154bb5d298c1f2355b9f93348a291010183e7de0b2fbe120f

                    SHA512

                    fe16263bb171bf10a0bb47cde31333fa1d9aff54a243fd696cb3d329e64dd34d13063b3c36fda9c236e91c4f00e80e0f23435f44b59908518fd85c774b6ef967

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7302.exe

                    Filesize

                    354KB

                    MD5

                    7a5498bd1c28f940746f30733bdc0704

                    SHA1

                    77ea32e0dd5bd5c51379f668cac1997529e2d400

                    SHA256

                    a13a88a2163f03f1fde032da1383bd37b1e7f29fa35408028a69bef5e1e6cd34

                    SHA512

                    bb2bf46d72bc035d4f33643afe29149d90759aa27695cd73f16f2af771f03835d4940e478c9e2d98dfdc46224c2e520e30c3253d09f8beb198a848a2495deecb

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7302.exe

                    Filesize

                    354KB

                    MD5

                    7a5498bd1c28f940746f30733bdc0704

                    SHA1

                    77ea32e0dd5bd5c51379f668cac1997529e2d400

                    SHA256

                    a13a88a2163f03f1fde032da1383bd37b1e7f29fa35408028a69bef5e1e6cd34

                    SHA512

                    bb2bf46d72bc035d4f33643afe29149d90759aa27695cd73f16f2af771f03835d4940e478c9e2d98dfdc46224c2e520e30c3253d09f8beb198a848a2495deecb

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu603856.exe

                    Filesize

                    13KB

                    MD5

                    28ba8d20180b3c321e36e316e0bfbec8

                    SHA1

                    dcf9ec3af9a9913c5bcf5340c8f08ead8b492820

                    SHA256

                    e01d6bd502fd624274f6568972059c5c1b8c2f615f37bfb03c2597c6ca84acce

                    SHA512

                    a28fc08bbc666b5c77508897742b3cd595cd8359262bfd148c109cc601ab20bbb82ad447c1482ecf79e46da07043875587ede5ea8d7364ebc1bdb2a9a738db08

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu603856.exe

                    Filesize

                    13KB

                    MD5

                    28ba8d20180b3c321e36e316e0bfbec8

                    SHA1

                    dcf9ec3af9a9913c5bcf5340c8f08ead8b492820

                    SHA256

                    e01d6bd502fd624274f6568972059c5c1b8c2f615f37bfb03c2597c6ca84acce

                    SHA512

                    a28fc08bbc666b5c77508897742b3cd595cd8359262bfd148c109cc601ab20bbb82ad447c1482ecf79e46da07043875587ede5ea8d7364ebc1bdb2a9a738db08

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0874.exe

                    Filesize

                    307KB

                    MD5

                    fd0b7eecd60284a192c60d85b10788a9

                    SHA1

                    373d395cfa416ab2218a445823385c1383cb10ab

                    SHA256

                    c8f9755cc84d647c43fc4b3590a9517a1022ac4039c9d427c172db452679829f

                    SHA512

                    62291b068a294fe178a0fe8573e08e3c84ba5cbdaeeac9f7146c19f6872c41ef419506127810ed80ad33fd3de7ecf40cd6ab16d8ef14c5a18c2994ae3d70dcd1

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0874.exe

                    Filesize

                    307KB

                    MD5

                    fd0b7eecd60284a192c60d85b10788a9

                    SHA1

                    373d395cfa416ab2218a445823385c1383cb10ab

                    SHA256

                    c8f9755cc84d647c43fc4b3590a9517a1022ac4039c9d427c172db452679829f

                    SHA512

                    62291b068a294fe178a0fe8573e08e3c84ba5cbdaeeac9f7146c19f6872c41ef419506127810ed80ad33fd3de7ecf40cd6ab16d8ef14c5a18c2994ae3d70dcd1

                  • memory/1056-161-0x0000000000360000-0x000000000036A000-memory.dmp

                    Filesize

                    40KB

                  • memory/1404-177-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-183-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-185-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-187-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-189-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-191-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-193-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-195-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-197-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-198-0x0000000000400000-0x000000000070F000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/1404-199-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1404-201-0x0000000000400000-0x000000000070F000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/1404-181-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-179-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-175-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-173-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-171-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-170-0x0000000005380000-0x0000000005392000-memory.dmp

                    Filesize

                    72KB

                  • memory/1404-169-0x0000000004DD0000-0x0000000005374000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/1404-168-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1404-167-0x0000000000710000-0x000000000073D000-memory.dmp

                    Filesize

                    180KB

                  • memory/3744-212-0x0000000002850000-0x0000000002860000-memory.dmp

                    Filesize

                    64KB

                  • memory/3744-1123-0x0000000005FF0000-0x0000000006056000-memory.dmp

                    Filesize

                    408KB

                  • memory/3744-223-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-225-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-227-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-229-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-231-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-233-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-235-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-237-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-239-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-241-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-243-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-1116-0x0000000005460000-0x0000000005A78000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/3744-1117-0x0000000005B00000-0x0000000005C0A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/3744-1118-0x0000000005C40000-0x0000000005C52000-memory.dmp

                    Filesize

                    72KB

                  • memory/3744-1119-0x0000000005C60000-0x0000000005C9C000-memory.dmp

                    Filesize

                    240KB

                  • memory/3744-1120-0x0000000002850000-0x0000000002860000-memory.dmp

                    Filesize

                    64KB

                  • memory/3744-1122-0x0000000005F50000-0x0000000005FE2000-memory.dmp

                    Filesize

                    584KB

                  • memory/3744-221-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-1124-0x0000000002850000-0x0000000002860000-memory.dmp

                    Filesize

                    64KB

                  • memory/3744-1125-0x0000000002850000-0x0000000002860000-memory.dmp

                    Filesize

                    64KB

                  • memory/3744-1126-0x0000000002850000-0x0000000002860000-memory.dmp

                    Filesize

                    64KB

                  • memory/3744-1127-0x0000000006810000-0x0000000006886000-memory.dmp

                    Filesize

                    472KB

                  • memory/3744-1128-0x00000000068A0000-0x00000000068F0000-memory.dmp

                    Filesize

                    320KB

                  • memory/3744-1129-0x0000000006930000-0x0000000006AF2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/3744-1130-0x0000000006B00000-0x000000000702C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/3744-1131-0x0000000002850000-0x0000000002860000-memory.dmp

                    Filesize

                    64KB

                  • memory/3744-219-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-215-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-207-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-206-0x0000000000720000-0x000000000076B000-memory.dmp

                    Filesize

                    300KB

                  • memory/3744-217-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-213-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/3744-208-0x0000000002850000-0x0000000002860000-memory.dmp

                    Filesize

                    64KB

                  • memory/3744-210-0x0000000002850000-0x0000000002860000-memory.dmp

                    Filesize

                    64KB

                  • memory/3744-209-0x00000000052A0000-0x00000000052DF000-memory.dmp

                    Filesize

                    252KB

                  • memory/4684-1138-0x0000000005160000-0x0000000005170000-memory.dmp

                    Filesize

                    64KB

                  • memory/4684-1137-0x00000000004F0000-0x0000000000522000-memory.dmp

                    Filesize

                    200KB