Analysis

  • max time kernel
    105s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:55

General

  • Target

    ca81c3bc6068da101462e452063ce359159de831a26a4ab23c012146959fabfb.exe

  • Size

    1019KB

  • MD5

    a9bbedc43b82c8ede159b46f5690497a

  • SHA1

    ce69cbc04565f2be3f0bd34f8209acce7c52fe93

  • SHA256

    ca81c3bc6068da101462e452063ce359159de831a26a4ab23c012146959fabfb

  • SHA512

    c77002919e884f3afed6e678f46451183b6cf8024f8798cd16d95d5bd32dd2a72a413fa519cd1df971ebfea45b7ee1120597d32acd3518f76acb171834ac0ec3

  • SSDEEP

    24576:pyFPWB6uGzxG1YtLj4vrZXud9iIqvvLIQuKU7+JW:cA6E1YtLjcc9invTIpzSJ

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

gong

C2

193.233.20.33:4125

Attributes
  • auth_value

    16950897b83de3bba9e4de36f06a8c05

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca81c3bc6068da101462e452063ce359159de831a26a4ab23c012146959fabfb.exe
    "C:\Users\Admin\AppData\Local\Temp\ca81c3bc6068da101462e452063ce359159de831a26a4ab23c012146959fabfb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7016.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7016.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0271.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0271.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2248
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0149.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0149.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1100
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu728835.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu728835.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2324
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9818.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9818.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:872
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 1084
              6⤵
              • Program crash
              PID:1056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dou45s23.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dou45s23.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1536
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 1680
            5⤵
            • Program crash
            PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en139079.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en139079.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge016710.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge016710.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3432
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2488
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4380
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4308
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4632
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3868
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:3720
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:636
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 872 -ip 872
                1⤵
                  PID:3820
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1536 -ip 1536
                  1⤵
                    PID:4608
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:560

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    7636673ec88db662ef531c90b8ffbf3b

                    SHA1

                    003fa69b2f2720892417d9be966cb3e29d58a24a

                    SHA256

                    7519d7613b19cf3b7d357be7dea6ca7a06270849ed3fe1a3de6fdabd5bb232ca

                    SHA512

                    723d12b0af641a74607a835091ce836dc7a89740b120aab8158e6d723684641ff602048cc6f0afd83fcd9c7377a8984efe5b23bdd22e2c41061675f53ba3f18d

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    7636673ec88db662ef531c90b8ffbf3b

                    SHA1

                    003fa69b2f2720892417d9be966cb3e29d58a24a

                    SHA256

                    7519d7613b19cf3b7d357be7dea6ca7a06270849ed3fe1a3de6fdabd5bb232ca

                    SHA512

                    723d12b0af641a74607a835091ce836dc7a89740b120aab8158e6d723684641ff602048cc6f0afd83fcd9c7377a8984efe5b23bdd22e2c41061675f53ba3f18d

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    7636673ec88db662ef531c90b8ffbf3b

                    SHA1

                    003fa69b2f2720892417d9be966cb3e29d58a24a

                    SHA256

                    7519d7613b19cf3b7d357be7dea6ca7a06270849ed3fe1a3de6fdabd5bb232ca

                    SHA512

                    723d12b0af641a74607a835091ce836dc7a89740b120aab8158e6d723684641ff602048cc6f0afd83fcd9c7377a8984efe5b23bdd22e2c41061675f53ba3f18d

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    7636673ec88db662ef531c90b8ffbf3b

                    SHA1

                    003fa69b2f2720892417d9be966cb3e29d58a24a

                    SHA256

                    7519d7613b19cf3b7d357be7dea6ca7a06270849ed3fe1a3de6fdabd5bb232ca

                    SHA512

                    723d12b0af641a74607a835091ce836dc7a89740b120aab8158e6d723684641ff602048cc6f0afd83fcd9c7377a8984efe5b23bdd22e2c41061675f53ba3f18d

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge016710.exe

                    Filesize

                    227KB

                    MD5

                    7636673ec88db662ef531c90b8ffbf3b

                    SHA1

                    003fa69b2f2720892417d9be966cb3e29d58a24a

                    SHA256

                    7519d7613b19cf3b7d357be7dea6ca7a06270849ed3fe1a3de6fdabd5bb232ca

                    SHA512

                    723d12b0af641a74607a835091ce836dc7a89740b120aab8158e6d723684641ff602048cc6f0afd83fcd9c7377a8984efe5b23bdd22e2c41061675f53ba3f18d

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge016710.exe

                    Filesize

                    227KB

                    MD5

                    7636673ec88db662ef531c90b8ffbf3b

                    SHA1

                    003fa69b2f2720892417d9be966cb3e29d58a24a

                    SHA256

                    7519d7613b19cf3b7d357be7dea6ca7a06270849ed3fe1a3de6fdabd5bb232ca

                    SHA512

                    723d12b0af641a74607a835091ce836dc7a89740b120aab8158e6d723684641ff602048cc6f0afd83fcd9c7377a8984efe5b23bdd22e2c41061675f53ba3f18d

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7016.exe

                    Filesize

                    839KB

                    MD5

                    edc86630756c07ca573af703e9c77a2e

                    SHA1

                    430d453216372172b30f7cda512e1989b7b2981c

                    SHA256

                    e1dde44b39e8d05b91a1dc6f004a54d44d9d884030f88d771b35a4d5e27776cb

                    SHA512

                    77a2effaacef91233e69f45d3febee823724e33299d17d0d60f76aed9b0b8f733b43a664745c84d0861f2e38f772edbab4d4a4d20851d4feaf3e9f1fa5ab6a1f

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7016.exe

                    Filesize

                    839KB

                    MD5

                    edc86630756c07ca573af703e9c77a2e

                    SHA1

                    430d453216372172b30f7cda512e1989b7b2981c

                    SHA256

                    e1dde44b39e8d05b91a1dc6f004a54d44d9d884030f88d771b35a4d5e27776cb

                    SHA512

                    77a2effaacef91233e69f45d3febee823724e33299d17d0d60f76aed9b0b8f733b43a664745c84d0861f2e38f772edbab4d4a4d20851d4feaf3e9f1fa5ab6a1f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en139079.exe

                    Filesize

                    175KB

                    MD5

                    70b19b53877427b709b592fe8f4dfd23

                    SHA1

                    ec3555b3c63b013ab5a5a5ffcbece4f07cf88ff8

                    SHA256

                    1c2e69d812cee9a3bfbeee6ce5eac89f61e7f64a60cb17c190c97eed3a4fcc9f

                    SHA512

                    eb94d85b7e8ad71971a7187f2b75342b0577e187517d93a6aa5f48b02f32ed063960f2cd5c77b790abdb0476d344db0acccd22a0b907b72d6115d24f59a60088

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en139079.exe

                    Filesize

                    175KB

                    MD5

                    70b19b53877427b709b592fe8f4dfd23

                    SHA1

                    ec3555b3c63b013ab5a5a5ffcbece4f07cf88ff8

                    SHA256

                    1c2e69d812cee9a3bfbeee6ce5eac89f61e7f64a60cb17c190c97eed3a4fcc9f

                    SHA512

                    eb94d85b7e8ad71971a7187f2b75342b0577e187517d93a6aa5f48b02f32ed063960f2cd5c77b790abdb0476d344db0acccd22a0b907b72d6115d24f59a60088

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0271.exe

                    Filesize

                    696KB

                    MD5

                    e10566982ea38a11b0eee9d158a767b8

                    SHA1

                    92cebccd9c68f3ed751ed9f9662b08743ab6e9a4

                    SHA256

                    72101ad9c9a0f10171e0833077d1ced131d4b423df2eccb8be28d461aa05acf0

                    SHA512

                    79fc2de8a22a33b7b5eac49e406cc8390055c4cf6bb27eb9981c208f94c280ab1006f240d7233836316e59231ab5a6dac084c9366d6e172e34c6e580f67602ef

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0271.exe

                    Filesize

                    696KB

                    MD5

                    e10566982ea38a11b0eee9d158a767b8

                    SHA1

                    92cebccd9c68f3ed751ed9f9662b08743ab6e9a4

                    SHA256

                    72101ad9c9a0f10171e0833077d1ced131d4b423df2eccb8be28d461aa05acf0

                    SHA512

                    79fc2de8a22a33b7b5eac49e406cc8390055c4cf6bb27eb9981c208f94c280ab1006f240d7233836316e59231ab5a6dac084c9366d6e172e34c6e580f67602ef

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dou45s23.exe

                    Filesize

                    350KB

                    MD5

                    8cff462de3d04c2e02f19ec0c85be406

                    SHA1

                    27f24b308114ccee86c2d5d5ea49394a22788f2d

                    SHA256

                    29ac99dd08ce97751bfc292935970a816fa3c42cb469bb59042b0bf436fba30d

                    SHA512

                    c4a0c4ee20a17701495a03f506f1532b3f11e52030cdb7a85dae9fbee004fc98c0a0967e98b4e502cdc4ab4383546b94bf90b85bd1f0b477444f57b4c978e0e0

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dou45s23.exe

                    Filesize

                    350KB

                    MD5

                    8cff462de3d04c2e02f19ec0c85be406

                    SHA1

                    27f24b308114ccee86c2d5d5ea49394a22788f2d

                    SHA256

                    29ac99dd08ce97751bfc292935970a816fa3c42cb469bb59042b0bf436fba30d

                    SHA512

                    c4a0c4ee20a17701495a03f506f1532b3f11e52030cdb7a85dae9fbee004fc98c0a0967e98b4e502cdc4ab4383546b94bf90b85bd1f0b477444f57b4c978e0e0

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0149.exe

                    Filesize

                    345KB

                    MD5

                    56648dc5f12d8aa45ac9f734286a011a

                    SHA1

                    98415ef718ca3388a84d99a5c3299ce7e94aa00c

                    SHA256

                    9a68220779ac59757d39b35aec06aab508c60cd9f96b1e7da02d3d0b89bb299c

                    SHA512

                    fad1ab68b2c5c9006e0bbcf6b7eb4aa9390881ea1ba065ead83e7b520640210e006e321478c783ca100d5ac1bd897045f8937f52a6d5170194baadebcc4403f5

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0149.exe

                    Filesize

                    345KB

                    MD5

                    56648dc5f12d8aa45ac9f734286a011a

                    SHA1

                    98415ef718ca3388a84d99a5c3299ce7e94aa00c

                    SHA256

                    9a68220779ac59757d39b35aec06aab508c60cd9f96b1e7da02d3d0b89bb299c

                    SHA512

                    fad1ab68b2c5c9006e0bbcf6b7eb4aa9390881ea1ba065ead83e7b520640210e006e321478c783ca100d5ac1bd897045f8937f52a6d5170194baadebcc4403f5

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu728835.exe

                    Filesize

                    12KB

                    MD5

                    45666f689f0c3e1ec9aa5a08372fff9c

                    SHA1

                    5c71fe0e8d7092fd01571230b76f094fd92b2821

                    SHA256

                    57faa2b808b24ffd195f946713e3e344649d88754c0419baaf63fc43d8a916ff

                    SHA512

                    6fb84c8161d3cac91df6dce3a4327628c3fcd9e5d37dbd9eaefeb749c4cc46dd7f87afd88e438feba62ae5cbb205d15af06c6023ee34a669428d1a615f595eb0

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu728835.exe

                    Filesize

                    12KB

                    MD5

                    45666f689f0c3e1ec9aa5a08372fff9c

                    SHA1

                    5c71fe0e8d7092fd01571230b76f094fd92b2821

                    SHA256

                    57faa2b808b24ffd195f946713e3e344649d88754c0419baaf63fc43d8a916ff

                    SHA512

                    6fb84c8161d3cac91df6dce3a4327628c3fcd9e5d37dbd9eaefeb749c4cc46dd7f87afd88e438feba62ae5cbb205d15af06c6023ee34a669428d1a615f595eb0

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9818.exe

                    Filesize

                    292KB

                    MD5

                    bca69ed75876cb3a035015723d16eb98

                    SHA1

                    71a06229b2543aa0d718d6d091bb014c9b2927d8

                    SHA256

                    7530a946022690be46211feb1b695abf323a80133659afa2a17db448cfd37e07

                    SHA512

                    a0b03aa5620f04fe829d93b4ecceee1ee2e6a2345b628ce32db43adc0d7c4d0d98598f417f7bc27582bfda7e2bb925703a7efd70a173d46b334256ea373aba13

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9818.exe

                    Filesize

                    292KB

                    MD5

                    bca69ed75876cb3a035015723d16eb98

                    SHA1

                    71a06229b2543aa0d718d6d091bb014c9b2927d8

                    SHA256

                    7530a946022690be46211feb1b695abf323a80133659afa2a17db448cfd37e07

                    SHA512

                    a0b03aa5620f04fe829d93b4ecceee1ee2e6a2345b628ce32db43adc0d7c4d0d98598f417f7bc27582bfda7e2bb925703a7efd70a173d46b334256ea373aba13

                  • memory/872-177-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-199-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-172-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-179-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-181-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-183-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-185-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-187-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-189-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-191-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-193-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-195-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-197-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-175-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-200-0x0000000000400000-0x000000000070C000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/872-201-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/872-202-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/872-203-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/872-205-0x0000000000400000-0x000000000070C000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/872-173-0x0000000004C70000-0x0000000004C82000-memory.dmp

                    Filesize

                    72KB

                  • memory/872-169-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/872-170-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/872-171-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/872-168-0x00000000007E0000-0x000000000080D000-memory.dmp

                    Filesize

                    180KB

                  • memory/872-167-0x0000000004CD0000-0x0000000005274000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/1536-215-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-1123-0x0000000005C90000-0x0000000005CCC000-memory.dmp

                    Filesize

                    240KB

                  • memory/1536-221-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-223-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-225-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-227-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-229-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-231-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-233-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-235-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-237-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-239-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-241-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-243-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-245-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-247-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-1120-0x0000000005560000-0x0000000005B78000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/1536-1121-0x0000000005B80000-0x0000000005C8A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/1536-1122-0x0000000004F50000-0x0000000004F62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1536-218-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-1124-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1536-1126-0x0000000005F50000-0x0000000005FB6000-memory.dmp

                    Filesize

                    408KB

                  • memory/1536-1127-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1536-1128-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1536-1129-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1536-1130-0x0000000006710000-0x00000000067A2000-memory.dmp

                    Filesize

                    584KB

                  • memory/1536-1131-0x0000000006810000-0x00000000069D2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/1536-1132-0x00000000069E0000-0x0000000006F0C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/1536-1133-0x0000000008310000-0x0000000008386000-memory.dmp

                    Filesize

                    472KB

                  • memory/1536-1134-0x00000000083A0000-0x00000000083F0000-memory.dmp

                    Filesize

                    320KB

                  • memory/1536-1135-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1536-210-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-211-0x00000000024D0000-0x000000000250E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1536-213-0x0000000000890000-0x00000000008DB000-memory.dmp

                    Filesize

                    300KB

                  • memory/1536-219-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1536-217-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1536-214-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2324-161-0x0000000000E60000-0x0000000000E6A000-memory.dmp

                    Filesize

                    40KB

                  • memory/5072-1142-0x0000000004BF0000-0x0000000004C00000-memory.dmp

                    Filesize

                    64KB

                  • memory/5072-1141-0x0000000000030000-0x0000000000062000-memory.dmp

                    Filesize

                    200KB