Analysis

  • max time kernel
    147s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:19

General

  • Target

    500418d93631a95ec42a12bc889d961d2fdf173836af7a09891b600e62d2f7b3.exe

  • Size

    1.0MB

  • MD5

    5d0dd2a15e366bd009c733dd2aec42b3

  • SHA1

    0ceba8d864b38b605c475730cf5b31375111e8fb

  • SHA256

    500418d93631a95ec42a12bc889d961d2fdf173836af7a09891b600e62d2f7b3

  • SHA512

    017cebc3af986582d048dce909ac5a19758eeb5f33f79d8cdd6800376a3481b3223d8548e862f1ac415630dad66c7b9f0040f1928cc433f0930af55a1a6d963e

  • SSDEEP

    24576:ayHiuw7qBYY0zkxqLf3yOHJhszroyhZ9:hHiFmBQkxerKz3

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\500418d93631a95ec42a12bc889d961d2fdf173836af7a09891b600e62d2f7b3.exe
    "C:\Users\Admin\AppData\Local\Temp\500418d93631a95ec42a12bc889d961d2fdf173836af7a09891b600e62d2f7b3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1524.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1524.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina5955.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina5955.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4208
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8422.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8422.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3412
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu288927.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu288927.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1228
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2476.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2476.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:228
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 1092
              6⤵
              • Program crash
              PID:5064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmo38s03.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmo38s03.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3696
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 1704
            5⤵
            • Program crash
            PID:1392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en558131.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en558131.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge956656.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge956656.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4852
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4044
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3936
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4292
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4584
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4624
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:1948
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:592
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4204
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:740
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 228 -ip 228
                1⤵
                  PID:4736
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3696 -ip 3696
                  1⤵
                    PID:5052
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:388
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4780

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    84414a50034f67c57d527d00d6fd2726

                    SHA1

                    459ef88fcbccf4636b618250916272be24897cad

                    SHA256

                    6d25b2c5c7cc94004b451bc273f724da1ffd96cc8ceaef59ac34e9eed468e25f

                    SHA512

                    84602935276171498d6bedbd253e5da325166f9d2d2ff380cc0d98753f74968f352e00de3f840ae237ecedcb47451a49a9b9046d54061a18692e92fcc9e03c51

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    84414a50034f67c57d527d00d6fd2726

                    SHA1

                    459ef88fcbccf4636b618250916272be24897cad

                    SHA256

                    6d25b2c5c7cc94004b451bc273f724da1ffd96cc8ceaef59ac34e9eed468e25f

                    SHA512

                    84602935276171498d6bedbd253e5da325166f9d2d2ff380cc0d98753f74968f352e00de3f840ae237ecedcb47451a49a9b9046d54061a18692e92fcc9e03c51

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    84414a50034f67c57d527d00d6fd2726

                    SHA1

                    459ef88fcbccf4636b618250916272be24897cad

                    SHA256

                    6d25b2c5c7cc94004b451bc273f724da1ffd96cc8ceaef59ac34e9eed468e25f

                    SHA512

                    84602935276171498d6bedbd253e5da325166f9d2d2ff380cc0d98753f74968f352e00de3f840ae237ecedcb47451a49a9b9046d54061a18692e92fcc9e03c51

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    84414a50034f67c57d527d00d6fd2726

                    SHA1

                    459ef88fcbccf4636b618250916272be24897cad

                    SHA256

                    6d25b2c5c7cc94004b451bc273f724da1ffd96cc8ceaef59ac34e9eed468e25f

                    SHA512

                    84602935276171498d6bedbd253e5da325166f9d2d2ff380cc0d98753f74968f352e00de3f840ae237ecedcb47451a49a9b9046d54061a18692e92fcc9e03c51

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    84414a50034f67c57d527d00d6fd2726

                    SHA1

                    459ef88fcbccf4636b618250916272be24897cad

                    SHA256

                    6d25b2c5c7cc94004b451bc273f724da1ffd96cc8ceaef59ac34e9eed468e25f

                    SHA512

                    84602935276171498d6bedbd253e5da325166f9d2d2ff380cc0d98753f74968f352e00de3f840ae237ecedcb47451a49a9b9046d54061a18692e92fcc9e03c51

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge956656.exe

                    Filesize

                    227KB

                    MD5

                    84414a50034f67c57d527d00d6fd2726

                    SHA1

                    459ef88fcbccf4636b618250916272be24897cad

                    SHA256

                    6d25b2c5c7cc94004b451bc273f724da1ffd96cc8ceaef59ac34e9eed468e25f

                    SHA512

                    84602935276171498d6bedbd253e5da325166f9d2d2ff380cc0d98753f74968f352e00de3f840ae237ecedcb47451a49a9b9046d54061a18692e92fcc9e03c51

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge956656.exe

                    Filesize

                    227KB

                    MD5

                    84414a50034f67c57d527d00d6fd2726

                    SHA1

                    459ef88fcbccf4636b618250916272be24897cad

                    SHA256

                    6d25b2c5c7cc94004b451bc273f724da1ffd96cc8ceaef59ac34e9eed468e25f

                    SHA512

                    84602935276171498d6bedbd253e5da325166f9d2d2ff380cc0d98753f74968f352e00de3f840ae237ecedcb47451a49a9b9046d54061a18692e92fcc9e03c51

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1524.exe

                    Filesize

                    858KB

                    MD5

                    ba2f6b325838a3837e79f83d1f221e98

                    SHA1

                    effbc3f028674ee51e31d577ec253bf685682bf5

                    SHA256

                    10ee1250036b3c74637af502dd3fab374b8834ca3d171fca18a2353e0e1fb700

                    SHA512

                    9de866d77ab059af6b87e71b39de871a3285ec3bc816d3d0d1047a65ec2cf8d5c316461cfd402b4c1e360ed85ca37a4371b9bc57a9f6d73417751f12a3d0c29f

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1524.exe

                    Filesize

                    858KB

                    MD5

                    ba2f6b325838a3837e79f83d1f221e98

                    SHA1

                    effbc3f028674ee51e31d577ec253bf685682bf5

                    SHA256

                    10ee1250036b3c74637af502dd3fab374b8834ca3d171fca18a2353e0e1fb700

                    SHA512

                    9de866d77ab059af6b87e71b39de871a3285ec3bc816d3d0d1047a65ec2cf8d5c316461cfd402b4c1e360ed85ca37a4371b9bc57a9f6d73417751f12a3d0c29f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en558131.exe

                    Filesize

                    175KB

                    MD5

                    7fe6f78c97cfeada77950040b48cc29b

                    SHA1

                    ad490d70ebc5a77b7bd2fd29c5e1b8b5b0a5a216

                    SHA256

                    b46e5487f2624e2c2aecd5311db71ea8807261d2657a5b4be7c69e909aa099ec

                    SHA512

                    279aed1a8a0fb1d0e1ad7f11a7d678c042918933b1c4e7efca9b996b4a864dd3c345f53b2439bb862095dc25ee66cfb5abbad1ec13b93d339be08776d87b383c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en558131.exe

                    Filesize

                    175KB

                    MD5

                    7fe6f78c97cfeada77950040b48cc29b

                    SHA1

                    ad490d70ebc5a77b7bd2fd29c5e1b8b5b0a5a216

                    SHA256

                    b46e5487f2624e2c2aecd5311db71ea8807261d2657a5b4be7c69e909aa099ec

                    SHA512

                    279aed1a8a0fb1d0e1ad7f11a7d678c042918933b1c4e7efca9b996b4a864dd3c345f53b2439bb862095dc25ee66cfb5abbad1ec13b93d339be08776d87b383c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina5955.exe

                    Filesize

                    715KB

                    MD5

                    beb1723be9f173eae72ce6d8d7f69e3e

                    SHA1

                    86b9107dd360688b3f257c440398674f9e5706f9

                    SHA256

                    9919623befea5f7fb3c231f538561ab2a01a84cdb6e855a43114f2c344fc7bfe

                    SHA512

                    798bfc73a073d548ada436c7c368be797a65d16766b57802715da5dc896defe7f5b7bd1d52111645895262a8ce13310d7317712c3792458eb2e70b3b1aa7d635

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina5955.exe

                    Filesize

                    715KB

                    MD5

                    beb1723be9f173eae72ce6d8d7f69e3e

                    SHA1

                    86b9107dd360688b3f257c440398674f9e5706f9

                    SHA256

                    9919623befea5f7fb3c231f538561ab2a01a84cdb6e855a43114f2c344fc7bfe

                    SHA512

                    798bfc73a073d548ada436c7c368be797a65d16766b57802715da5dc896defe7f5b7bd1d52111645895262a8ce13310d7317712c3792458eb2e70b3b1aa7d635

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmo38s03.exe

                    Filesize

                    366KB

                    MD5

                    525907b95a3ae7930699af512dc877d2

                    SHA1

                    2416504c90d249712ccf4debbbcd1d9656a2e73b

                    SHA256

                    71fd8b818e759b8c8e15e82142cc20c9c28e90a49c50792912555b494ec98f9e

                    SHA512

                    57d3fc57b26484d1136bc0d5f3a5a95a1595c7b7f0d7e8507ba1bd7d3e28605ba805f02f48da0bf46308fd5305326539f974713a9b4fc685a318fb7b8ba88605

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmo38s03.exe

                    Filesize

                    366KB

                    MD5

                    525907b95a3ae7930699af512dc877d2

                    SHA1

                    2416504c90d249712ccf4debbbcd1d9656a2e73b

                    SHA256

                    71fd8b818e759b8c8e15e82142cc20c9c28e90a49c50792912555b494ec98f9e

                    SHA512

                    57d3fc57b26484d1136bc0d5f3a5a95a1595c7b7f0d7e8507ba1bd7d3e28605ba805f02f48da0bf46308fd5305326539f974713a9b4fc685a318fb7b8ba88605

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8422.exe

                    Filesize

                    354KB

                    MD5

                    4848b27ecb85d76e63624e2544864fc4

                    SHA1

                    a154be42970553bfb3a27bd0130a917894ce073b

                    SHA256

                    30c0f8c20c3e2bf3e367960c8f9127748fb736abbcda174ec19ef972a98d0a3f

                    SHA512

                    50f64cc17dc6ff11440c19c2050880170076c72275d7c92759e5a146ba67a606c707f9aebc382eef2e28558375a84c3bb3b849b9163d1712e00e9885be753b17

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8422.exe

                    Filesize

                    354KB

                    MD5

                    4848b27ecb85d76e63624e2544864fc4

                    SHA1

                    a154be42970553bfb3a27bd0130a917894ce073b

                    SHA256

                    30c0f8c20c3e2bf3e367960c8f9127748fb736abbcda174ec19ef972a98d0a3f

                    SHA512

                    50f64cc17dc6ff11440c19c2050880170076c72275d7c92759e5a146ba67a606c707f9aebc382eef2e28558375a84c3bb3b849b9163d1712e00e9885be753b17

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu288927.exe

                    Filesize

                    13KB

                    MD5

                    e53c9cf3d3d8e7fde3b04f59c9f610c2

                    SHA1

                    335dc0d108c1c2eb25e3e6565c5fc1254597492d

                    SHA256

                    bb51150a3f601d548a90d44c010649850d84fbc3b31a5cbb441050a08d3252a4

                    SHA512

                    6730d95c16e0174d1d2bbf77a28020c77cbd8f9a47aca9c5902348d092ef6b87000d888346a5f1983b49f1b0dfde9fcd3d11d09b27f8f5bc5964d2b438805742

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu288927.exe

                    Filesize

                    13KB

                    MD5

                    e53c9cf3d3d8e7fde3b04f59c9f610c2

                    SHA1

                    335dc0d108c1c2eb25e3e6565c5fc1254597492d

                    SHA256

                    bb51150a3f601d548a90d44c010649850d84fbc3b31a5cbb441050a08d3252a4

                    SHA512

                    6730d95c16e0174d1d2bbf77a28020c77cbd8f9a47aca9c5902348d092ef6b87000d888346a5f1983b49f1b0dfde9fcd3d11d09b27f8f5bc5964d2b438805742

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2476.exe

                    Filesize

                    308KB

                    MD5

                    26f949adaacc10382f8779fc0107cf67

                    SHA1

                    7b7c34ea3d74e28875eb9473fadd62d7cd868fc3

                    SHA256

                    c159138af273548975e25b6f989fca917cbc1d196b4d81abf4686e1482cafe29

                    SHA512

                    c3a5c9fa4e3a8772522af4b71686e642d7bccf8edd651d982a2f57938f5806df4213c006c249ae787e73edf61ef104300d32b199e63d597d4f3be6071f35b36d

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2476.exe

                    Filesize

                    308KB

                    MD5

                    26f949adaacc10382f8779fc0107cf67

                    SHA1

                    7b7c34ea3d74e28875eb9473fadd62d7cd868fc3

                    SHA256

                    c159138af273548975e25b6f989fca917cbc1d196b4d81abf4686e1482cafe29

                    SHA512

                    c3a5c9fa4e3a8772522af4b71686e642d7bccf8edd651d982a2f57938f5806df4213c006c249ae787e73edf61ef104300d32b199e63d597d4f3be6071f35b36d

                  • memory/228-183-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-201-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/228-181-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-177-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-185-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-187-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-189-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-191-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-193-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-195-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-197-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-199-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-200-0x0000000000400000-0x0000000000710000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/228-179-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-202-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/228-203-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/228-205-0x0000000000400000-0x0000000000710000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/228-167-0x0000000004EF0000-0x0000000005494000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/228-175-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-173-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-172-0x0000000002960000-0x0000000002972000-memory.dmp

                    Filesize

                    72KB

                  • memory/228-171-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/228-169-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/228-170-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/228-168-0x00000000007E0000-0x000000000080D000-memory.dmp

                    Filesize

                    180KB

                  • memory/1228-161-0x0000000000A70000-0x0000000000A7A000-memory.dmp

                    Filesize

                    40KB

                  • memory/3596-1142-0x00000000049C0000-0x00000000049D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3596-1141-0x0000000000120000-0x0000000000152000-memory.dmp

                    Filesize

                    200KB

                  • memory/3696-215-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-231-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-233-0x0000000000720000-0x000000000076B000-memory.dmp

                    Filesize

                    300KB

                  • memory/3696-236-0x0000000004C60000-0x0000000004C70000-memory.dmp

                    Filesize

                    64KB

                  • memory/3696-235-0x0000000004C60000-0x0000000004C70000-memory.dmp

                    Filesize

                    64KB

                  • memory/3696-234-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-241-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-243-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-239-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-238-0x0000000004C60000-0x0000000004C70000-memory.dmp

                    Filesize

                    64KB

                  • memory/3696-245-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-247-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-1120-0x0000000005560000-0x0000000005B78000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/3696-1121-0x0000000005C00000-0x0000000005D0A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/3696-1122-0x0000000005D40000-0x0000000005D52000-memory.dmp

                    Filesize

                    72KB

                  • memory/3696-1123-0x0000000005D60000-0x0000000005D9C000-memory.dmp

                    Filesize

                    240KB

                  • memory/3696-1124-0x0000000004C60000-0x0000000004C70000-memory.dmp

                    Filesize

                    64KB

                  • memory/3696-1125-0x0000000006050000-0x00000000060B6000-memory.dmp

                    Filesize

                    408KB

                  • memory/3696-1127-0x0000000006710000-0x00000000067A2000-memory.dmp

                    Filesize

                    584KB

                  • memory/3696-1128-0x0000000004C60000-0x0000000004C70000-memory.dmp

                    Filesize

                    64KB

                  • memory/3696-1129-0x0000000004C60000-0x0000000004C70000-memory.dmp

                    Filesize

                    64KB

                  • memory/3696-1130-0x0000000004C60000-0x0000000004C70000-memory.dmp

                    Filesize

                    64KB

                  • memory/3696-1131-0x0000000006810000-0x00000000069D2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/3696-1132-0x00000000069F0000-0x0000000006F1C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/3696-1133-0x0000000004C60000-0x0000000004C70000-memory.dmp

                    Filesize

                    64KB

                  • memory/3696-1134-0x00000000071A0000-0x0000000007216000-memory.dmp

                    Filesize

                    472KB

                  • memory/3696-229-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-227-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-223-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-225-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-221-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-219-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-217-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-213-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-211-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-210-0x0000000004C10000-0x0000000004C4F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3696-1135-0x0000000007230000-0x0000000007280000-memory.dmp

                    Filesize

                    320KB