Analysis

  • max time kernel
    116s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:04

General

  • Target

    7a26ab7d7c41f23280e2565a1e35a70ad8630f53466eef7d4b97533307ee2883.exe

  • Size

    1010KB

  • MD5

    470df765f80d1e2b3baf1e97cba4214b

  • SHA1

    f6d47d07244a13b8f8e42a348ea759b494a0c08a

  • SHA256

    7a26ab7d7c41f23280e2565a1e35a70ad8630f53466eef7d4b97533307ee2883

  • SHA512

    49684b49082f0b42bd4579e138644b24520ebca0d3a7bab7d88e69f2450a475b2a35b610510b414b2869e441e09f84f697f0b59c40f2f52012246f8a302d5703

  • SSDEEP

    24576:EynrPmUXoMwh7ageRIJqvpBWsiQrTuYHh61DB1:Tnjyh7a/RIibiQrTuYS

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a26ab7d7c41f23280e2565a1e35a70ad8630f53466eef7d4b97533307ee2883.exe
    "C:\Users\Admin\AppData\Local\Temp\7a26ab7d7c41f23280e2565a1e35a70ad8630f53466eef7d4b97533307ee2883.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8541.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8541.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina7156.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina7156.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:784
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8152.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8152.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1312
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu834571.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu834571.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5020
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1230.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1230.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3532
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 1080
              6⤵
              • Program crash
              PID:2296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dho74s14.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dho74s14.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:980
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 1348
            5⤵
            • Program crash
            PID:3240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en116511.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en116511.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge493855.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge493855.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1296
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4280
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1404
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1432
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:876
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:1672
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3656
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1080
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4664
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4612
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3532 -ip 3532
                1⤵
                  PID:3764
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 980 -ip 980
                  1⤵
                    PID:844
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:236

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    9889842b17562c0d3ec98e39132b0619

                    SHA1

                    40097d536b4adb2a8d6d87a0290589680ee6ad37

                    SHA256

                    eef1b9d7dcb058f86490a5559c84c66d3f367aa83ec866778dde042c622e09e9

                    SHA512

                    d9eb2ba6f2e79709ec810f1851b41382444d3bb34f05cac2272fab498e5c1da28edab1ea5e8c530ae2aca22bdbe728fb595594ebc0ff51166a8184c47be45c65

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    9889842b17562c0d3ec98e39132b0619

                    SHA1

                    40097d536b4adb2a8d6d87a0290589680ee6ad37

                    SHA256

                    eef1b9d7dcb058f86490a5559c84c66d3f367aa83ec866778dde042c622e09e9

                    SHA512

                    d9eb2ba6f2e79709ec810f1851b41382444d3bb34f05cac2272fab498e5c1da28edab1ea5e8c530ae2aca22bdbe728fb595594ebc0ff51166a8184c47be45c65

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    9889842b17562c0d3ec98e39132b0619

                    SHA1

                    40097d536b4adb2a8d6d87a0290589680ee6ad37

                    SHA256

                    eef1b9d7dcb058f86490a5559c84c66d3f367aa83ec866778dde042c622e09e9

                    SHA512

                    d9eb2ba6f2e79709ec810f1851b41382444d3bb34f05cac2272fab498e5c1da28edab1ea5e8c530ae2aca22bdbe728fb595594ebc0ff51166a8184c47be45c65

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    9889842b17562c0d3ec98e39132b0619

                    SHA1

                    40097d536b4adb2a8d6d87a0290589680ee6ad37

                    SHA256

                    eef1b9d7dcb058f86490a5559c84c66d3f367aa83ec866778dde042c622e09e9

                    SHA512

                    d9eb2ba6f2e79709ec810f1851b41382444d3bb34f05cac2272fab498e5c1da28edab1ea5e8c530ae2aca22bdbe728fb595594ebc0ff51166a8184c47be45c65

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge493855.exe

                    Filesize

                    227KB

                    MD5

                    9889842b17562c0d3ec98e39132b0619

                    SHA1

                    40097d536b4adb2a8d6d87a0290589680ee6ad37

                    SHA256

                    eef1b9d7dcb058f86490a5559c84c66d3f367aa83ec866778dde042c622e09e9

                    SHA512

                    d9eb2ba6f2e79709ec810f1851b41382444d3bb34f05cac2272fab498e5c1da28edab1ea5e8c530ae2aca22bdbe728fb595594ebc0ff51166a8184c47be45c65

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge493855.exe

                    Filesize

                    227KB

                    MD5

                    9889842b17562c0d3ec98e39132b0619

                    SHA1

                    40097d536b4adb2a8d6d87a0290589680ee6ad37

                    SHA256

                    eef1b9d7dcb058f86490a5559c84c66d3f367aa83ec866778dde042c622e09e9

                    SHA512

                    d9eb2ba6f2e79709ec810f1851b41382444d3bb34f05cac2272fab498e5c1da28edab1ea5e8c530ae2aca22bdbe728fb595594ebc0ff51166a8184c47be45c65

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8541.exe

                    Filesize

                    828KB

                    MD5

                    4a0acebceccbf4934b0266eaebcac3a2

                    SHA1

                    7710f44ba609b0ce15a17834000800c3dc48484a

                    SHA256

                    14d7d601dd4aa2d5146f34fd9a100e83592eeb3b24f21bf389825f45779a62bb

                    SHA512

                    904fb46011785d41edbeab7f501fa3f8f48c0e113d4501f2e1681ac125846eafc253dd746eb86e30236066de7240eb1c33379e0a6e06e558dc03f7e96a5d8428

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8541.exe

                    Filesize

                    828KB

                    MD5

                    4a0acebceccbf4934b0266eaebcac3a2

                    SHA1

                    7710f44ba609b0ce15a17834000800c3dc48484a

                    SHA256

                    14d7d601dd4aa2d5146f34fd9a100e83592eeb3b24f21bf389825f45779a62bb

                    SHA512

                    904fb46011785d41edbeab7f501fa3f8f48c0e113d4501f2e1681ac125846eafc253dd746eb86e30236066de7240eb1c33379e0a6e06e558dc03f7e96a5d8428

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en116511.exe

                    Filesize

                    175KB

                    MD5

                    d50d0eee2a0390bdb3a749d14de1a9f4

                    SHA1

                    91a5bcc3741f8d52a857e7476a0c47462800a4b4

                    SHA256

                    1b9a39fc35bc04a42122aedd6fcd5c52adf6f3472d6e082a3e6fd0afedaeef36

                    SHA512

                    2759837ec22655d1bb8d0f14a06dd94a3b8d11905341f2795fdae8ab5318c40d124d6d928d39b80f7b42db1afdba483b1185e63d58ca1aa92ef714ae67c8e8d9

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en116511.exe

                    Filesize

                    175KB

                    MD5

                    d50d0eee2a0390bdb3a749d14de1a9f4

                    SHA1

                    91a5bcc3741f8d52a857e7476a0c47462800a4b4

                    SHA256

                    1b9a39fc35bc04a42122aedd6fcd5c52adf6f3472d6e082a3e6fd0afedaeef36

                    SHA512

                    2759837ec22655d1bb8d0f14a06dd94a3b8d11905341f2795fdae8ab5318c40d124d6d928d39b80f7b42db1afdba483b1185e63d58ca1aa92ef714ae67c8e8d9

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina7156.exe

                    Filesize

                    686KB

                    MD5

                    0b24203b2a2a49497872c4a477b11976

                    SHA1

                    eb02c284209e1816b6f511844d7bba17652e205b

                    SHA256

                    ba3047c9bdae9fa05e768f34a5eba430dd432f8d29711a5059c88f1796c79698

                    SHA512

                    71247cb17db1d91e675a23e388d3d17f99363ddf05db1f028f04460962517d5c82276ef2e72e9f599b10ad92a62158320b649caa58927fa4e71f8d140324e6cb

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina7156.exe

                    Filesize

                    686KB

                    MD5

                    0b24203b2a2a49497872c4a477b11976

                    SHA1

                    eb02c284209e1816b6f511844d7bba17652e205b

                    SHA256

                    ba3047c9bdae9fa05e768f34a5eba430dd432f8d29711a5059c88f1796c79698

                    SHA512

                    71247cb17db1d91e675a23e388d3d17f99363ddf05db1f028f04460962517d5c82276ef2e72e9f599b10ad92a62158320b649caa58927fa4e71f8d140324e6cb

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dho74s14.exe

                    Filesize

                    331KB

                    MD5

                    b4074a7b3be5cd949158928e3ef9b7f4

                    SHA1

                    59dbbf0dbf44db4ca20300916f198ac41ba1609d

                    SHA256

                    8f95340997e1c19898a27408e83a43d5b3d94a09213959524331dcc7108b8745

                    SHA512

                    27e72d1bc5ba1fdab0b629535f81789ddaef18ab2c6b607214541a188a541d65327acc22f600f4e3d6e3243ffe931cfbd34f812199f57412bc0fb30fd8485d8a

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dho74s14.exe

                    Filesize

                    331KB

                    MD5

                    b4074a7b3be5cd949158928e3ef9b7f4

                    SHA1

                    59dbbf0dbf44db4ca20300916f198ac41ba1609d

                    SHA256

                    8f95340997e1c19898a27408e83a43d5b3d94a09213959524331dcc7108b8745

                    SHA512

                    27e72d1bc5ba1fdab0b629535f81789ddaef18ab2c6b607214541a188a541d65327acc22f600f4e3d6e3243ffe931cfbd34f812199f57412bc0fb30fd8485d8a

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8152.exe

                    Filesize

                    339KB

                    MD5

                    7bcc628c7063d51871f1c4179e8804d1

                    SHA1

                    31313ea239dfbc707166ac248087d527f0ef6c78

                    SHA256

                    4ae8b1baad0d26c0ad6d9806ddf5d54a22bb2e4a071eb4c57884e80b84b94287

                    SHA512

                    6479df024668e4b5d9481fcff877b7b635686b885fb822c77b1e5714a483de5cdc96d4b61d98b16576db2bc96e45379c07df19a23d8c00cac95260070b729ebc

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8152.exe

                    Filesize

                    339KB

                    MD5

                    7bcc628c7063d51871f1c4179e8804d1

                    SHA1

                    31313ea239dfbc707166ac248087d527f0ef6c78

                    SHA256

                    4ae8b1baad0d26c0ad6d9806ddf5d54a22bb2e4a071eb4c57884e80b84b94287

                    SHA512

                    6479df024668e4b5d9481fcff877b7b635686b885fb822c77b1e5714a483de5cdc96d4b61d98b16576db2bc96e45379c07df19a23d8c00cac95260070b729ebc

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu834571.exe

                    Filesize

                    13KB

                    MD5

                    f8e8d84ee1180cf04cb01bbf1e053624

                    SHA1

                    eea22fb1665b5207cc6f08ad3073583020d50d5e

                    SHA256

                    859e6ad11c4a75949c0392c1913581e5b29cbad41785dbfbd22965c4528a2fc5

                    SHA512

                    1461454dbf645266d7854228d2344c2561d4699e68eb212f326fe5d7e90c9fdbb7ca062feb17c0afc922a57c7a23bad412d338a7fc14bac8b5e1a0ac0c4a1edc

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu834571.exe

                    Filesize

                    13KB

                    MD5

                    f8e8d84ee1180cf04cb01bbf1e053624

                    SHA1

                    eea22fb1665b5207cc6f08ad3073583020d50d5e

                    SHA256

                    859e6ad11c4a75949c0392c1913581e5b29cbad41785dbfbd22965c4528a2fc5

                    SHA512

                    1461454dbf645266d7854228d2344c2561d4699e68eb212f326fe5d7e90c9fdbb7ca062feb17c0afc922a57c7a23bad412d338a7fc14bac8b5e1a0ac0c4a1edc

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1230.exe

                    Filesize

                    272KB

                    MD5

                    637454723a973e86424a0b4b15a4dce9

                    SHA1

                    fdbaa0d13f1d4e8b9821be83a4a7323022931902

                    SHA256

                    1509dab1b776795d68dd64b79a74718e27b5089268b81aa1d84c52d5211229f7

                    SHA512

                    91e38ba0c5eca87134d62fb39f4a9d96aee8de688f1fd31e8ada4d36d6e510dd255efca75b2795a88b52f29d8e8014e222122fb734697f97009999896aa1c53e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1230.exe

                    Filesize

                    272KB

                    MD5

                    637454723a973e86424a0b4b15a4dce9

                    SHA1

                    fdbaa0d13f1d4e8b9821be83a4a7323022931902

                    SHA256

                    1509dab1b776795d68dd64b79a74718e27b5089268b81aa1d84c52d5211229f7

                    SHA512

                    91e38ba0c5eca87134d62fb39f4a9d96aee8de688f1fd31e8ada4d36d6e510dd255efca75b2795a88b52f29d8e8014e222122fb734697f97009999896aa1c53e

                  • memory/980-1123-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/980-1130-0x0000000008B50000-0x0000000008BC6000-memory.dmp

                    Filesize

                    472KB

                  • memory/980-1134-0x0000000009280000-0x00000000097AC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/980-1133-0x00000000090B0000-0x0000000009272000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/980-1132-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/980-1131-0x0000000008BE0000-0x0000000008C30000-memory.dmp

                    Filesize

                    320KB

                  • memory/980-1129-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/980-1128-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/980-1127-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/980-1125-0x0000000005EB0000-0x0000000005F16000-memory.dmp

                    Filesize

                    408KB

                  • memory/980-1124-0x0000000005E10000-0x0000000005EA2000-memory.dmp

                    Filesize

                    584KB

                  • memory/980-1122-0x0000000004E30000-0x0000000004E6C000-memory.dmp

                    Filesize

                    240KB

                  • memory/980-1121-0x0000000004E10000-0x0000000004E22000-memory.dmp

                    Filesize

                    72KB

                  • memory/980-1120-0x0000000005A50000-0x0000000005B5A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/980-1119-0x0000000005430000-0x0000000005A48000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/980-246-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-244-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-242-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-210-0x0000000000AF0000-0x0000000000B3B000-memory.dmp

                    Filesize

                    300KB

                  • memory/980-211-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/980-212-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/980-213-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-214-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-218-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-220-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-224-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-226-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-228-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-230-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-232-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-234-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-236-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-238-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/980-240-0x0000000004D20000-0x0000000004D5F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3532-189-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-202-0x0000000004E40000-0x0000000004E50000-memory.dmp

                    Filesize

                    64KB

                  • memory/3532-177-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-203-0x0000000004E40000-0x0000000004E50000-memory.dmp

                    Filesize

                    64KB

                  • memory/3532-187-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-201-0x0000000004E40000-0x0000000004E50000-memory.dmp

                    Filesize

                    64KB

                  • memory/3532-200-0x0000000000400000-0x0000000000707000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/3532-175-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-199-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-197-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-195-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-185-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-191-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-181-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-205-0x0000000000400000-0x0000000000707000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/3532-179-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-193-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-183-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-173-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

                    Filesize

                    72KB

                  • memory/3532-167-0x0000000004E50000-0x00000000053F4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/3532-168-0x00000000007E0000-0x000000000080D000-memory.dmp

                    Filesize

                    180KB

                  • memory/3532-169-0x0000000004E40000-0x0000000004E50000-memory.dmp

                    Filesize

                    64KB

                  • memory/3532-171-0x0000000004E40000-0x0000000004E50000-memory.dmp

                    Filesize

                    64KB

                  • memory/3532-170-0x0000000004E40000-0x0000000004E50000-memory.dmp

                    Filesize

                    64KB

                  • memory/5020-161-0x0000000000330000-0x000000000033A000-memory.dmp

                    Filesize

                    40KB

                  • memory/5080-1142-0x0000000005820000-0x0000000005830000-memory.dmp

                    Filesize

                    64KB

                  • memory/5080-1141-0x0000000005820000-0x0000000005830000-memory.dmp

                    Filesize

                    64KB

                  • memory/5080-1140-0x0000000000C70000-0x0000000000CA2000-memory.dmp

                    Filesize

                    200KB