Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:15

General

  • Target

    ce9fdd07d640c4f00d24c980a8d4b0fed1012a1b039becc6bee7253927c4ddc1.exe

  • Size

    1021KB

  • MD5

    71d71499f8d66f6382122d336114e38b

  • SHA1

    0ca7fd299973ca12300489e88ff7651e9dba19b7

  • SHA256

    ce9fdd07d640c4f00d24c980a8d4b0fed1012a1b039becc6bee7253927c4ddc1

  • SHA512

    0af855b35fe3e7e570ad1d336b93c15237324eee38f7039c5f742ea5e1f823274cd9efa4d27458d427b5bf670c58e4782fb728419b12ef4f04de453913548875

  • SSDEEP

    24576:kyyTTvXGYuLFrM9oW9T5doQAwIM57xQ61OWFsqA38O8n:zCPGYag7dosICxhVFsHMO8

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

gong

C2

193.233.20.33:4125

Attributes
  • auth_value

    16950897b83de3bba9e4de36f06a8c05

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce9fdd07d640c4f00d24c980a8d4b0fed1012a1b039becc6bee7253927c4ddc1.exe
    "C:\Users\Admin\AppData\Local\Temp\ce9fdd07d640c4f00d24c980a8d4b0fed1012a1b039becc6bee7253927c4ddc1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1056.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1056.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina7431.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina7431.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4108
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8351.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8351.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4104
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu847672.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu847672.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1818.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1818.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4128
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 1084
              6⤵
              • Program crash
              PID:1240
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dzo10s76.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dzo10s76.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3308
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 1544
            5⤵
            • Program crash
            PID:1148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en772141.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en772141.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge728700.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge728700.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3376
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4452
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4024
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5076
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:2976
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4348
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4852
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4960
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4676
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4128 -ip 4128
                1⤵
                  PID:2152
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3308 -ip 3308
                  1⤵
                    PID:4944
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4972
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3884

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    f6a69cbde690473e922ba9e7ff18bdf3

                    SHA1

                    a9c569602bfe10a3cae048bb27d9081e947f131b

                    SHA256

                    9339c9dc571198701ebfea4c326a4dfc56b97c59b6b8d2835a775820a9a4f507

                    SHA512

                    004a6dbface95e534427514c831a79c402f5587cdf2f15925b4085effbc130b55daf74add3d970413df847631423a7553c5eda2a9d3ae89ae31700ef082d799c

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    f6a69cbde690473e922ba9e7ff18bdf3

                    SHA1

                    a9c569602bfe10a3cae048bb27d9081e947f131b

                    SHA256

                    9339c9dc571198701ebfea4c326a4dfc56b97c59b6b8d2835a775820a9a4f507

                    SHA512

                    004a6dbface95e534427514c831a79c402f5587cdf2f15925b4085effbc130b55daf74add3d970413df847631423a7553c5eda2a9d3ae89ae31700ef082d799c

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    f6a69cbde690473e922ba9e7ff18bdf3

                    SHA1

                    a9c569602bfe10a3cae048bb27d9081e947f131b

                    SHA256

                    9339c9dc571198701ebfea4c326a4dfc56b97c59b6b8d2835a775820a9a4f507

                    SHA512

                    004a6dbface95e534427514c831a79c402f5587cdf2f15925b4085effbc130b55daf74add3d970413df847631423a7553c5eda2a9d3ae89ae31700ef082d799c

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    f6a69cbde690473e922ba9e7ff18bdf3

                    SHA1

                    a9c569602bfe10a3cae048bb27d9081e947f131b

                    SHA256

                    9339c9dc571198701ebfea4c326a4dfc56b97c59b6b8d2835a775820a9a4f507

                    SHA512

                    004a6dbface95e534427514c831a79c402f5587cdf2f15925b4085effbc130b55daf74add3d970413df847631423a7553c5eda2a9d3ae89ae31700ef082d799c

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    f6a69cbde690473e922ba9e7ff18bdf3

                    SHA1

                    a9c569602bfe10a3cae048bb27d9081e947f131b

                    SHA256

                    9339c9dc571198701ebfea4c326a4dfc56b97c59b6b8d2835a775820a9a4f507

                    SHA512

                    004a6dbface95e534427514c831a79c402f5587cdf2f15925b4085effbc130b55daf74add3d970413df847631423a7553c5eda2a9d3ae89ae31700ef082d799c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge728700.exe

                    Filesize

                    227KB

                    MD5

                    f6a69cbde690473e922ba9e7ff18bdf3

                    SHA1

                    a9c569602bfe10a3cae048bb27d9081e947f131b

                    SHA256

                    9339c9dc571198701ebfea4c326a4dfc56b97c59b6b8d2835a775820a9a4f507

                    SHA512

                    004a6dbface95e534427514c831a79c402f5587cdf2f15925b4085effbc130b55daf74add3d970413df847631423a7553c5eda2a9d3ae89ae31700ef082d799c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge728700.exe

                    Filesize

                    227KB

                    MD5

                    f6a69cbde690473e922ba9e7ff18bdf3

                    SHA1

                    a9c569602bfe10a3cae048bb27d9081e947f131b

                    SHA256

                    9339c9dc571198701ebfea4c326a4dfc56b97c59b6b8d2835a775820a9a4f507

                    SHA512

                    004a6dbface95e534427514c831a79c402f5587cdf2f15925b4085effbc130b55daf74add3d970413df847631423a7553c5eda2a9d3ae89ae31700ef082d799c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1056.exe

                    Filesize

                    839KB

                    MD5

                    088272ba1ad94386323245951748b2e2

                    SHA1

                    df62be2e6e7854c7878631ed8e58eb7595f236fd

                    SHA256

                    e5f877a1f80ceddc84614bc9a2a7d1d9c7365d491c4e4a001137bd3aa60b46c2

                    SHA512

                    c5f59b59b7194ec83a080c6f99d89d26eff132ceeb36ece00f10ce2a40b3773ef2cb89942cb93420eee3f422c89270c191e3bc18716ae956a6b6da1bed1ca6b9

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1056.exe

                    Filesize

                    839KB

                    MD5

                    088272ba1ad94386323245951748b2e2

                    SHA1

                    df62be2e6e7854c7878631ed8e58eb7595f236fd

                    SHA256

                    e5f877a1f80ceddc84614bc9a2a7d1d9c7365d491c4e4a001137bd3aa60b46c2

                    SHA512

                    c5f59b59b7194ec83a080c6f99d89d26eff132ceeb36ece00f10ce2a40b3773ef2cb89942cb93420eee3f422c89270c191e3bc18716ae956a6b6da1bed1ca6b9

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en772141.exe

                    Filesize

                    175KB

                    MD5

                    024f117512bc4881483156dc10fdd887

                    SHA1

                    90ab160747c7bcf81e842939b5c0f1a30ea8cd6e

                    SHA256

                    3f07a62a9fc50bd8f2fb38eab69a7c8827f71fce7e3099bad97b02c02d7b62f5

                    SHA512

                    36b022475a275d4f196f77a3f59cc64d484a2a0bb8c3c77354773e5d2cdcf5b3f1fb8d96d608a7500d9629df7c43a9ec54ba7d6a109d7c3c3a84141c5860f95f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en772141.exe

                    Filesize

                    175KB

                    MD5

                    024f117512bc4881483156dc10fdd887

                    SHA1

                    90ab160747c7bcf81e842939b5c0f1a30ea8cd6e

                    SHA256

                    3f07a62a9fc50bd8f2fb38eab69a7c8827f71fce7e3099bad97b02c02d7b62f5

                    SHA512

                    36b022475a275d4f196f77a3f59cc64d484a2a0bb8c3c77354773e5d2cdcf5b3f1fb8d96d608a7500d9629df7c43a9ec54ba7d6a109d7c3c3a84141c5860f95f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina7431.exe

                    Filesize

                    696KB

                    MD5

                    592dc959016d650914581461963ca4d7

                    SHA1

                    a63fb181b057e89b154b19b23b8a0c93ba498887

                    SHA256

                    f4579baf300cab2a691bd336d3134265ab68e4797274f8ebc6c4bd311883febb

                    SHA512

                    f0ad4772ff86fdd829a7f478a00b0aa8a6a70eb0a3b86789fa015690397be3fd0570b5f3adc65efa6be0584a8f5272bbce4567ac8a581150da07a7d17e31879f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina7431.exe

                    Filesize

                    696KB

                    MD5

                    592dc959016d650914581461963ca4d7

                    SHA1

                    a63fb181b057e89b154b19b23b8a0c93ba498887

                    SHA256

                    f4579baf300cab2a691bd336d3134265ab68e4797274f8ebc6c4bd311883febb

                    SHA512

                    f0ad4772ff86fdd829a7f478a00b0aa8a6a70eb0a3b86789fa015690397be3fd0570b5f3adc65efa6be0584a8f5272bbce4567ac8a581150da07a7d17e31879f

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dzo10s76.exe

                    Filesize

                    350KB

                    MD5

                    a2f7625f9c1eacdc76c838544f63acbc

                    SHA1

                    8445235f1c15c1948daf544575e67416d62b2129

                    SHA256

                    9a558c38a7dbe3c8c0af5c31acfe0a1414184fa55b1ac3b0265fdba3a4bea024

                    SHA512

                    a296c79943603157efb4066f55def3bc92549ca5ca10921d4fced61ae90cb43452a96e552eda21de5919e8fcd96e93b7ad1bbc520f1cff1d2dec5cfaab7f014e

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dzo10s76.exe

                    Filesize

                    350KB

                    MD5

                    a2f7625f9c1eacdc76c838544f63acbc

                    SHA1

                    8445235f1c15c1948daf544575e67416d62b2129

                    SHA256

                    9a558c38a7dbe3c8c0af5c31acfe0a1414184fa55b1ac3b0265fdba3a4bea024

                    SHA512

                    a296c79943603157efb4066f55def3bc92549ca5ca10921d4fced61ae90cb43452a96e552eda21de5919e8fcd96e93b7ad1bbc520f1cff1d2dec5cfaab7f014e

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8351.exe

                    Filesize

                    345KB

                    MD5

                    c078829242afb9a0692c98120aae4a9f

                    SHA1

                    07e31c36a9365008f53c36c93fd0922a35453fb8

                    SHA256

                    4ec5fef5e90204f1bae0f43b1906b8f3d6369c2906b1f6e813bcb8b5970582fc

                    SHA512

                    8c8da307e44743ee2173a9053d1ae3a31badd5393e8d334808719706da803231abca6f108699cd83f8c62c747ec20af02ccaab146e92fd2313ffbfd7159c11f0

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8351.exe

                    Filesize

                    345KB

                    MD5

                    c078829242afb9a0692c98120aae4a9f

                    SHA1

                    07e31c36a9365008f53c36c93fd0922a35453fb8

                    SHA256

                    4ec5fef5e90204f1bae0f43b1906b8f3d6369c2906b1f6e813bcb8b5970582fc

                    SHA512

                    8c8da307e44743ee2173a9053d1ae3a31badd5393e8d334808719706da803231abca6f108699cd83f8c62c747ec20af02ccaab146e92fd2313ffbfd7159c11f0

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu847672.exe

                    Filesize

                    12KB

                    MD5

                    e3f66fef21fa2c33ecb7ee8b38167083

                    SHA1

                    6bea6eaa6c71590aacd5a56b2393f8f8dec7aad9

                    SHA256

                    d87bafa19ea183158a9651bfd9f5c0470d090809cad9016ab81ca87a98f09e43

                    SHA512

                    b3d5e22e6ec85c589982f1e3423bfbe610be32bd5063de49a00595224b403bf32ca530f7b5e70d3286bee837b690d1c781e4fe35b58738897fe3a10249c92cd6

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu847672.exe

                    Filesize

                    12KB

                    MD5

                    e3f66fef21fa2c33ecb7ee8b38167083

                    SHA1

                    6bea6eaa6c71590aacd5a56b2393f8f8dec7aad9

                    SHA256

                    d87bafa19ea183158a9651bfd9f5c0470d090809cad9016ab81ca87a98f09e43

                    SHA512

                    b3d5e22e6ec85c589982f1e3423bfbe610be32bd5063de49a00595224b403bf32ca530f7b5e70d3286bee837b690d1c781e4fe35b58738897fe3a10249c92cd6

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1818.exe

                    Filesize

                    292KB

                    MD5

                    1a077b4277dfc2cd61672c64bc20ce29

                    SHA1

                    317130e136dec19b26e63a52f8e93c25aa23276b

                    SHA256

                    71f86cb86097742f5d6052f84520b3adee490f5bcefa000af353c81e5c86d7ef

                    SHA512

                    5bf39c604644887fc79b9d8cc660d90255208801db337a74d6623ca629494dcf245931691294c7aff8be36a11607cfe16234ee559dde3ca5a41e3a2924ef2816

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1818.exe

                    Filesize

                    292KB

                    MD5

                    1a077b4277dfc2cd61672c64bc20ce29

                    SHA1

                    317130e136dec19b26e63a52f8e93c25aa23276b

                    SHA256

                    71f86cb86097742f5d6052f84520b3adee490f5bcefa000af353c81e5c86d7ef

                    SHA512

                    5bf39c604644887fc79b9d8cc660d90255208801db337a74d6623ca629494dcf245931691294c7aff8be36a11607cfe16234ee559dde3ca5a41e3a2924ef2816

                  • memory/532-1140-0x0000000004B70000-0x0000000004B80000-memory.dmp

                    Filesize

                    64KB

                  • memory/532-1139-0x00000000002F0000-0x0000000000322000-memory.dmp

                    Filesize

                    200KB

                  • memory/3308-1123-0x0000000005F50000-0x0000000005FE2000-memory.dmp

                    Filesize

                    584KB

                  • memory/3308-239-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-1133-0x0000000004C80000-0x0000000004C90000-memory.dmp

                    Filesize

                    64KB

                  • memory/3308-1132-0x0000000006C10000-0x000000000713C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/3308-1131-0x0000000006A40000-0x0000000006C02000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/3308-1130-0x00000000069E0000-0x0000000006A30000-memory.dmp

                    Filesize

                    320KB

                  • memory/3308-1129-0x0000000006950000-0x00000000069C6000-memory.dmp

                    Filesize

                    472KB

                  • memory/3308-1128-0x0000000004C80000-0x0000000004C90000-memory.dmp

                    Filesize

                    64KB

                  • memory/3308-1127-0x0000000004C80000-0x0000000004C90000-memory.dmp

                    Filesize

                    64KB

                  • memory/3308-1126-0x0000000004C80000-0x0000000004C90000-memory.dmp

                    Filesize

                    64KB

                  • memory/3308-1124-0x0000000005FF0000-0x0000000006056000-memory.dmp

                    Filesize

                    408KB

                  • memory/3308-1122-0x0000000004C80000-0x0000000004C90000-memory.dmp

                    Filesize

                    64KB

                  • memory/3308-1121-0x0000000005C60000-0x0000000005C9C000-memory.dmp

                    Filesize

                    240KB

                  • memory/3308-209-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-211-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-208-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-213-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-215-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-217-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-218-0x0000000000720000-0x000000000076B000-memory.dmp

                    Filesize

                    300KB

                  • memory/3308-221-0x0000000004C80000-0x0000000004C90000-memory.dmp

                    Filesize

                    64KB

                  • memory/3308-220-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-223-0x0000000004C80000-0x0000000004C90000-memory.dmp

                    Filesize

                    64KB

                  • memory/3308-225-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-224-0x0000000004C80000-0x0000000004C90000-memory.dmp

                    Filesize

                    64KB

                  • memory/3308-227-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-229-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-231-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-233-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-235-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-237-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-1120-0x0000000005C40000-0x0000000005C52000-memory.dmp

                    Filesize

                    72KB

                  • memory/3308-241-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-243-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-245-0x0000000005280000-0x00000000052BE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3308-1118-0x0000000005460000-0x0000000005A78000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/3308-1119-0x0000000005B00000-0x0000000005C0A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/3704-161-0x00000000006B0000-0x00000000006BA000-memory.dmp

                    Filesize

                    40KB

                  • memory/4128-191-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-185-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-193-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-203-0x0000000000400000-0x000000000070C000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/4128-201-0x0000000002A70000-0x0000000002A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/4128-200-0x0000000002A70000-0x0000000002A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/4128-199-0x0000000002A70000-0x0000000002A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/4128-198-0x0000000000400000-0x000000000070C000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/4128-197-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-181-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-183-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-187-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-195-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-179-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-177-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-175-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-173-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-171-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-170-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4128-169-0x0000000002A70000-0x0000000002A80000-memory.dmp

                    Filesize

                    64KB

                  • memory/4128-168-0x0000000000800000-0x000000000082D000-memory.dmp

                    Filesize

                    180KB

                  • memory/4128-167-0x0000000004EF0000-0x0000000005494000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4128-189-0x00000000028B0000-0x00000000028C2000-memory.dmp

                    Filesize

                    72KB