Analysis

  • max time kernel
    111s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:01

General

  • Target

    bf662ca207feacc94aa2504e018f734244e8ee0d17322df89d042493948a6aaf.exe

  • Size

    1021KB

  • MD5

    ef11c82ddb04dddf9a235e2be6325c6a

  • SHA1

    dd21e1b21ba9a6945f1fc26338a4487d0b36f66e

  • SHA256

    bf662ca207feacc94aa2504e018f734244e8ee0d17322df89d042493948a6aaf

  • SHA512

    4f37b6c83ae0e75d2823f1435957d060d5534c59b3af22fe5184523d4832cd00fc1a99a0092e4fbd0314420d1a2e61b1ab7cdf43417d3c872e3f8e956f175c41

  • SSDEEP

    24576:ZyS8ZbHYERB0SlOAICErEeajtwr61AKH68vZ4Q7hQbaQM4+73:MZHYEvITgeajtwqAqp4MIM

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

gong

C2

193.233.20.33:4125

Attributes
  • auth_value

    16950897b83de3bba9e4de36f06a8c05

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf662ca207feacc94aa2504e018f734244e8ee0d17322df89d042493948a6aaf.exe
    "C:\Users\Admin\AppData\Local\Temp\bf662ca207feacc94aa2504e018f734244e8ee0d17322df89d042493948a6aaf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5097.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5097.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0733.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0733.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5842.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5842.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3276
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu041069.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu041069.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1124
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1736.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1736.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2676
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 1040
              6⤵
              • Program crash
              PID:4956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTc66s71.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTc66s71.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1708
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 1856
            5⤵
            • Program crash
            PID:5104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en408253.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en408253.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4524
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge594433.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge594433.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4760
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3328
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4664
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:832
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:2052
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:1184
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1548
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:3640
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:5060
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2676 -ip 2676
                1⤵
                  PID:4980
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1708 -ip 1708
                  1⤵
                    PID:3344
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:720

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    1310fa5a79a8af0c34e8dae89731a8c1

                    SHA1

                    7b8652c9d25b6661daed43d5559c488d9f148967

                    SHA256

                    1566f898780dc6efe735ea2003b0e0a5e75785b7f1cf680ef26e58f74eb0e107

                    SHA512

                    afef4871416ed2c9816d02f78cae5f618be1b99ec771d2e673c4389bcab394a8d8e8610fee495de5b2b559b7cef3a3f431032b523fc4be6ccd248c7e22f0bc65

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    1310fa5a79a8af0c34e8dae89731a8c1

                    SHA1

                    7b8652c9d25b6661daed43d5559c488d9f148967

                    SHA256

                    1566f898780dc6efe735ea2003b0e0a5e75785b7f1cf680ef26e58f74eb0e107

                    SHA512

                    afef4871416ed2c9816d02f78cae5f618be1b99ec771d2e673c4389bcab394a8d8e8610fee495de5b2b559b7cef3a3f431032b523fc4be6ccd248c7e22f0bc65

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    1310fa5a79a8af0c34e8dae89731a8c1

                    SHA1

                    7b8652c9d25b6661daed43d5559c488d9f148967

                    SHA256

                    1566f898780dc6efe735ea2003b0e0a5e75785b7f1cf680ef26e58f74eb0e107

                    SHA512

                    afef4871416ed2c9816d02f78cae5f618be1b99ec771d2e673c4389bcab394a8d8e8610fee495de5b2b559b7cef3a3f431032b523fc4be6ccd248c7e22f0bc65

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    1310fa5a79a8af0c34e8dae89731a8c1

                    SHA1

                    7b8652c9d25b6661daed43d5559c488d9f148967

                    SHA256

                    1566f898780dc6efe735ea2003b0e0a5e75785b7f1cf680ef26e58f74eb0e107

                    SHA512

                    afef4871416ed2c9816d02f78cae5f618be1b99ec771d2e673c4389bcab394a8d8e8610fee495de5b2b559b7cef3a3f431032b523fc4be6ccd248c7e22f0bc65

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge594433.exe

                    Filesize

                    227KB

                    MD5

                    1310fa5a79a8af0c34e8dae89731a8c1

                    SHA1

                    7b8652c9d25b6661daed43d5559c488d9f148967

                    SHA256

                    1566f898780dc6efe735ea2003b0e0a5e75785b7f1cf680ef26e58f74eb0e107

                    SHA512

                    afef4871416ed2c9816d02f78cae5f618be1b99ec771d2e673c4389bcab394a8d8e8610fee495de5b2b559b7cef3a3f431032b523fc4be6ccd248c7e22f0bc65

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge594433.exe

                    Filesize

                    227KB

                    MD5

                    1310fa5a79a8af0c34e8dae89731a8c1

                    SHA1

                    7b8652c9d25b6661daed43d5559c488d9f148967

                    SHA256

                    1566f898780dc6efe735ea2003b0e0a5e75785b7f1cf680ef26e58f74eb0e107

                    SHA512

                    afef4871416ed2c9816d02f78cae5f618be1b99ec771d2e673c4389bcab394a8d8e8610fee495de5b2b559b7cef3a3f431032b523fc4be6ccd248c7e22f0bc65

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5097.exe

                    Filesize

                    839KB

                    MD5

                    b483e886a0af45c5c1ce36889f87670e

                    SHA1

                    d0d66d0a2e590ba81fe9dfd43c654a2f783c166b

                    SHA256

                    38343753b6dd0680a06b0f4ade7d29040ea00e4a48af48269ba6a008d6f48f28

                    SHA512

                    bfeac9218cd42711a3ce2a09b52a61371b81d9e68f5c981e0a7284b408213cd2714fa0c80e73fedeebe5e62f8809a9504e99b88e34f4a7aa939744f25e65897e

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5097.exe

                    Filesize

                    839KB

                    MD5

                    b483e886a0af45c5c1ce36889f87670e

                    SHA1

                    d0d66d0a2e590ba81fe9dfd43c654a2f783c166b

                    SHA256

                    38343753b6dd0680a06b0f4ade7d29040ea00e4a48af48269ba6a008d6f48f28

                    SHA512

                    bfeac9218cd42711a3ce2a09b52a61371b81d9e68f5c981e0a7284b408213cd2714fa0c80e73fedeebe5e62f8809a9504e99b88e34f4a7aa939744f25e65897e

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en408253.exe

                    Filesize

                    175KB

                    MD5

                    64e4eaa8078fdb8bb61493cc2859e8a1

                    SHA1

                    839c3b11e3c5b34ffcb334bdffa351db2b6142d4

                    SHA256

                    bba3fd1b6270e1d914c0472a85f7fc18e2c7428c75d0eb0e9e66074de791ff6c

                    SHA512

                    9cd5f6a5cd80373ecec72e3322c93903462630414af5d029213375e91a1e0956170d856d15b4976d19559cdfbae524cbd732f24b04b5f8f8d06b38ada5e172af

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en408253.exe

                    Filesize

                    175KB

                    MD5

                    64e4eaa8078fdb8bb61493cc2859e8a1

                    SHA1

                    839c3b11e3c5b34ffcb334bdffa351db2b6142d4

                    SHA256

                    bba3fd1b6270e1d914c0472a85f7fc18e2c7428c75d0eb0e9e66074de791ff6c

                    SHA512

                    9cd5f6a5cd80373ecec72e3322c93903462630414af5d029213375e91a1e0956170d856d15b4976d19559cdfbae524cbd732f24b04b5f8f8d06b38ada5e172af

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0733.exe

                    Filesize

                    696KB

                    MD5

                    b7befc1532a4f8a797945af1ad5c8312

                    SHA1

                    dff33e561262041d764a9a6f919e1eda77ad6e7c

                    SHA256

                    6819441477dfea2f7a4d5af80af5a8be31d3f23bb6ef03c201f0671d3e454cb1

                    SHA512

                    b8560f952012152c08b82507a74e4b015d91b4604a0c9a0e6a9151dfcf43ffa90feff62500782e16fcbb9a6372eaf3d341de9ea96ed8d0d12924718fd162c4dc

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0733.exe

                    Filesize

                    696KB

                    MD5

                    b7befc1532a4f8a797945af1ad5c8312

                    SHA1

                    dff33e561262041d764a9a6f919e1eda77ad6e7c

                    SHA256

                    6819441477dfea2f7a4d5af80af5a8be31d3f23bb6ef03c201f0671d3e454cb1

                    SHA512

                    b8560f952012152c08b82507a74e4b015d91b4604a0c9a0e6a9151dfcf43ffa90feff62500782e16fcbb9a6372eaf3d341de9ea96ed8d0d12924718fd162c4dc

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTc66s71.exe

                    Filesize

                    350KB

                    MD5

                    577ad3eef23a615734cc67a989fec74b

                    SHA1

                    6caad8a5b38de120d82314a3869f40f0815a566c

                    SHA256

                    2bf0e52f1b0c1777748a9d68d1f24ffe13029d7426f5faa917f062a0d5049372

                    SHA512

                    afd3ce6149c4c7c9cf9106bd41e1e2d1e1b3278886259f49539fbd7869804bbea738f1727b117f6fd254c68f98b7967e8d04bbbe221f3b565779d99283aadfab

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTc66s71.exe

                    Filesize

                    350KB

                    MD5

                    577ad3eef23a615734cc67a989fec74b

                    SHA1

                    6caad8a5b38de120d82314a3869f40f0815a566c

                    SHA256

                    2bf0e52f1b0c1777748a9d68d1f24ffe13029d7426f5faa917f062a0d5049372

                    SHA512

                    afd3ce6149c4c7c9cf9106bd41e1e2d1e1b3278886259f49539fbd7869804bbea738f1727b117f6fd254c68f98b7967e8d04bbbe221f3b565779d99283aadfab

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5842.exe

                    Filesize

                    345KB

                    MD5

                    5e4c73f869094f4c41d042fcd44f46d9

                    SHA1

                    064bf38b16cdf7a3b85ab26da5edf708e2a318ae

                    SHA256

                    cbd4634e4398f22e014c144de97d31ff5dcc189e0d7d45eb29d448aea1feee0e

                    SHA512

                    d8cc595bea835105e66df4d1b3ed6cd62b3a4e06deb6d7db3596959a8177f6685d74b7e729a52ebdf5476d82abeccda3a47ce5cff309d906bb9a53f25926ec6c

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5842.exe

                    Filesize

                    345KB

                    MD5

                    5e4c73f869094f4c41d042fcd44f46d9

                    SHA1

                    064bf38b16cdf7a3b85ab26da5edf708e2a318ae

                    SHA256

                    cbd4634e4398f22e014c144de97d31ff5dcc189e0d7d45eb29d448aea1feee0e

                    SHA512

                    d8cc595bea835105e66df4d1b3ed6cd62b3a4e06deb6d7db3596959a8177f6685d74b7e729a52ebdf5476d82abeccda3a47ce5cff309d906bb9a53f25926ec6c

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu041069.exe

                    Filesize

                    12KB

                    MD5

                    1f777e8e9e6ec5577212882e33f34c5f

                    SHA1

                    b7fb11eda76b11d1d28459b4d364b31e15c27273

                    SHA256

                    b684bb2b56adcb87b0d556bee5fbd673399cd5fc5d68b5a3d12a56d590c0a233

                    SHA512

                    0e53c5f2ee9841136d6a180ac73172457a3ace0e64b1b0ef0a0a0e2aa7109818e152a43cfef3612cfa3a7b8daf6c76d60982d6dddd2248f973023ba5660f3a08

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu041069.exe

                    Filesize

                    12KB

                    MD5

                    1f777e8e9e6ec5577212882e33f34c5f

                    SHA1

                    b7fb11eda76b11d1d28459b4d364b31e15c27273

                    SHA256

                    b684bb2b56adcb87b0d556bee5fbd673399cd5fc5d68b5a3d12a56d590c0a233

                    SHA512

                    0e53c5f2ee9841136d6a180ac73172457a3ace0e64b1b0ef0a0a0e2aa7109818e152a43cfef3612cfa3a7b8daf6c76d60982d6dddd2248f973023ba5660f3a08

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1736.exe

                    Filesize

                    292KB

                    MD5

                    34dd110e4ddd533b26ac0c07f12f793d

                    SHA1

                    15715e900d55961f6aaca009c3d76596a1724494

                    SHA256

                    788a7460eaa2dcaa111ad611f948235c3790a016e6af7d6d4292b549513b3412

                    SHA512

                    cb8325ec7b74c622b5671c2fb55ffe363c20392fdc9761b1c25033bb07bb855ae6984a50d60fdb87680559732c12dde0a2781223dfa78b052cb2ed536be67ad5

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1736.exe

                    Filesize

                    292KB

                    MD5

                    34dd110e4ddd533b26ac0c07f12f793d

                    SHA1

                    15715e900d55961f6aaca009c3d76596a1724494

                    SHA256

                    788a7460eaa2dcaa111ad611f948235c3790a016e6af7d6d4292b549513b3412

                    SHA512

                    cb8325ec7b74c622b5671c2fb55ffe363c20392fdc9761b1c25033bb07bb855ae6984a50d60fdb87680559732c12dde0a2781223dfa78b052cb2ed536be67ad5

                  • memory/1124-161-0x00000000009A0000-0x00000000009AA000-memory.dmp

                    Filesize

                    40KB

                  • memory/1708-1120-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1708-235-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-1133-0x0000000007220000-0x0000000007270000-memory.dmp

                    Filesize

                    320KB

                  • memory/1708-1132-0x0000000007190000-0x0000000007206000-memory.dmp

                    Filesize

                    472KB

                  • memory/1708-1131-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1708-1130-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1708-1129-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1708-1128-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1708-1127-0x00000000069F0000-0x0000000006F1C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/1708-1126-0x0000000006810000-0x00000000069D2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/1708-1124-0x0000000005FF0000-0x0000000006056000-memory.dmp

                    Filesize

                    408KB

                  • memory/1708-1123-0x0000000005F50000-0x0000000005FE2000-memory.dmp

                    Filesize

                    584KB

                  • memory/1708-1122-0x0000000004D70000-0x0000000004DAC000-memory.dmp

                    Filesize

                    240KB

                  • memory/1708-1121-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-1119-0x0000000005BB0000-0x0000000005CBA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/1708-208-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-209-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-211-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-213-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-215-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-217-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-219-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-221-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-224-0x0000000000850000-0x000000000089B000-memory.dmp

                    Filesize

                    300KB

                  • memory/1708-223-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-227-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-226-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1708-231-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1708-230-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-228-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1708-233-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-1118-0x0000000005590000-0x0000000005BA8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/1708-237-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-239-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-241-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-243-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/1708-245-0x00000000028C0000-0x00000000028FE000-memory.dmp

                    Filesize

                    248KB

                  • memory/2676-190-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-203-0x0000000000400000-0x000000000070C000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/2676-186-0x0000000005040000-0x0000000005050000-memory.dmp

                    Filesize

                    64KB

                  • memory/2676-185-0x0000000005040000-0x0000000005050000-memory.dmp

                    Filesize

                    64KB

                  • memory/2676-188-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-202-0x0000000005040000-0x0000000005050000-memory.dmp

                    Filesize

                    64KB

                  • memory/2676-201-0x0000000005040000-0x0000000005050000-memory.dmp

                    Filesize

                    64KB

                  • memory/2676-184-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-198-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-196-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-194-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-192-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-180-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-182-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-199-0x0000000000400000-0x000000000070C000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/2676-178-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-176-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-167-0x00000000007E0000-0x000000000080D000-memory.dmp

                    Filesize

                    180KB

                  • memory/2676-168-0x0000000005050000-0x00000000055F4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/2676-174-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-172-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-169-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/2676-170-0x0000000002520000-0x0000000002532000-memory.dmp

                    Filesize

                    72KB

                  • memory/4524-1140-0x00000000052C0000-0x00000000052D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4524-1139-0x0000000000700000-0x0000000000732000-memory.dmp

                    Filesize

                    200KB