Analysis

  • max time kernel
    114s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:22

General

  • Target

    8cac3d299c7ae731f66e90007a49ef8eca96d9058885db2c50aa11674a207858.exe

  • Size

    1.0MB

  • MD5

    539740f5a35e9f0dab9dcaae8e854ceb

  • SHA1

    05cab88fc20511db9e13817a313cd598b29fb95c

  • SHA256

    8cac3d299c7ae731f66e90007a49ef8eca96d9058885db2c50aa11674a207858

  • SHA512

    cb69c4da76dd40f9a3130a3bf1fd88a06f67d741c42bcfb2f1565a974f15ed2341a7ec95f9889db91632adacd5b6d7694dde1d35aa634bd0f4ecfd8afff83f49

  • SSDEEP

    24576:/yU75UPKhH+aV20fUYjlo55y9fnR0BaBSThxz685dPagm5N/:KAQIHpcPLy9PMaALO8frm

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cac3d299c7ae731f66e90007a49ef8eca96d9058885db2c50aa11674a207858.exe
    "C:\Users\Admin\AppData\Local\Temp\8cac3d299c7ae731f66e90007a49ef8eca96d9058885db2c50aa11674a207858.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8112.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8112.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1013.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1013.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3465.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3465.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:740
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu055069.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu055069.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2268
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0777.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0777.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4368
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 1088
              6⤵
              • Program crash
              PID:4048
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmn76s94.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmn76s94.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2356
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 1552
            5⤵
            • Program crash
            PID:1260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en000349.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en000349.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge629690.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge629690.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5080
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:924
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4232
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3984
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:1276
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3904
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3408
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:1504
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:2612
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4368 -ip 4368
                1⤵
                  PID:4552
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2356 -ip 2356
                  1⤵
                    PID:3832
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2624

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    722b29688c0c1a82a7566adf5c44a898

                    SHA1

                    8ba828da99a021e5b2a72ba3011a4bc3d7155f49

                    SHA256

                    c9baffbda82a69b7ba969914a3212777543cfacffd945b6ebcc112473501a66b

                    SHA512

                    28e74314c9419bb5cd0d15ce82e39a91b68de73f0aa1683745cf45d209fc10aa5a01f2d41300b64b1457837329ca9c6490469160e377c39d7d7b9c6d901c93b5

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    722b29688c0c1a82a7566adf5c44a898

                    SHA1

                    8ba828da99a021e5b2a72ba3011a4bc3d7155f49

                    SHA256

                    c9baffbda82a69b7ba969914a3212777543cfacffd945b6ebcc112473501a66b

                    SHA512

                    28e74314c9419bb5cd0d15ce82e39a91b68de73f0aa1683745cf45d209fc10aa5a01f2d41300b64b1457837329ca9c6490469160e377c39d7d7b9c6d901c93b5

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    722b29688c0c1a82a7566adf5c44a898

                    SHA1

                    8ba828da99a021e5b2a72ba3011a4bc3d7155f49

                    SHA256

                    c9baffbda82a69b7ba969914a3212777543cfacffd945b6ebcc112473501a66b

                    SHA512

                    28e74314c9419bb5cd0d15ce82e39a91b68de73f0aa1683745cf45d209fc10aa5a01f2d41300b64b1457837329ca9c6490469160e377c39d7d7b9c6d901c93b5

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    722b29688c0c1a82a7566adf5c44a898

                    SHA1

                    8ba828da99a021e5b2a72ba3011a4bc3d7155f49

                    SHA256

                    c9baffbda82a69b7ba969914a3212777543cfacffd945b6ebcc112473501a66b

                    SHA512

                    28e74314c9419bb5cd0d15ce82e39a91b68de73f0aa1683745cf45d209fc10aa5a01f2d41300b64b1457837329ca9c6490469160e377c39d7d7b9c6d901c93b5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge629690.exe

                    Filesize

                    227KB

                    MD5

                    722b29688c0c1a82a7566adf5c44a898

                    SHA1

                    8ba828da99a021e5b2a72ba3011a4bc3d7155f49

                    SHA256

                    c9baffbda82a69b7ba969914a3212777543cfacffd945b6ebcc112473501a66b

                    SHA512

                    28e74314c9419bb5cd0d15ce82e39a91b68de73f0aa1683745cf45d209fc10aa5a01f2d41300b64b1457837329ca9c6490469160e377c39d7d7b9c6d901c93b5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge629690.exe

                    Filesize

                    227KB

                    MD5

                    722b29688c0c1a82a7566adf5c44a898

                    SHA1

                    8ba828da99a021e5b2a72ba3011a4bc3d7155f49

                    SHA256

                    c9baffbda82a69b7ba969914a3212777543cfacffd945b6ebcc112473501a66b

                    SHA512

                    28e74314c9419bb5cd0d15ce82e39a91b68de73f0aa1683745cf45d209fc10aa5a01f2d41300b64b1457837329ca9c6490469160e377c39d7d7b9c6d901c93b5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8112.exe

                    Filesize

                    859KB

                    MD5

                    c5fab2775b7161694e7b0fea97139bf1

                    SHA1

                    7d0f6943326f1fc2fc6b01ac7548125cb3520f62

                    SHA256

                    e548d860d5d8dd4c0ccf6751614a806d9f2fa62cb34e9ebf04626fff24ede7b4

                    SHA512

                    95600f91dba405bef0bec814422bf54d1ec074dabe74221f15de64c85096bbd7e2614549ca040085d73bd4212ae2d2cff8df65117638a77e12d064149b466adb

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8112.exe

                    Filesize

                    859KB

                    MD5

                    c5fab2775b7161694e7b0fea97139bf1

                    SHA1

                    7d0f6943326f1fc2fc6b01ac7548125cb3520f62

                    SHA256

                    e548d860d5d8dd4c0ccf6751614a806d9f2fa62cb34e9ebf04626fff24ede7b4

                    SHA512

                    95600f91dba405bef0bec814422bf54d1ec074dabe74221f15de64c85096bbd7e2614549ca040085d73bd4212ae2d2cff8df65117638a77e12d064149b466adb

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en000349.exe

                    Filesize

                    175KB

                    MD5

                    cd430e04f06164106e6e887176ed5766

                    SHA1

                    d47c1810a7af932f9c379dedd53e249c5436b5a9

                    SHA256

                    50fea75dbe11d260770e1ff85b93144913b887b27ac2d3c2a196f2d039d8039e

                    SHA512

                    73fc4a742266488474da10ff2550c55eff56234bb375cd1e0b3c8f53cbe0ab7f65b640fd15ee106079c50d7816255894c99905d1e6a914682bcb14dd93a4db90

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en000349.exe

                    Filesize

                    175KB

                    MD5

                    cd430e04f06164106e6e887176ed5766

                    SHA1

                    d47c1810a7af932f9c379dedd53e249c5436b5a9

                    SHA256

                    50fea75dbe11d260770e1ff85b93144913b887b27ac2d3c2a196f2d039d8039e

                    SHA512

                    73fc4a742266488474da10ff2550c55eff56234bb375cd1e0b3c8f53cbe0ab7f65b640fd15ee106079c50d7816255894c99905d1e6a914682bcb14dd93a4db90

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1013.exe

                    Filesize

                    716KB

                    MD5

                    993205b7ad7a88729c689f352afd3ce2

                    SHA1

                    f1f541fc56e5aa71af3cc5391a886cad78aff720

                    SHA256

                    4050133ab0129b739c3e78dfa20ec1dfc39fc19ed1c4e2a44a12345e47b9c8d3

                    SHA512

                    8607bfda5152ce3c1384b3094e04049457588a592fb2514d0985397b04a952bcf5946549e8c17a56bb490cd4a812047fb3fc137d2386e5579a8409872853d8f5

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1013.exe

                    Filesize

                    716KB

                    MD5

                    993205b7ad7a88729c689f352afd3ce2

                    SHA1

                    f1f541fc56e5aa71af3cc5391a886cad78aff720

                    SHA256

                    4050133ab0129b739c3e78dfa20ec1dfc39fc19ed1c4e2a44a12345e47b9c8d3

                    SHA512

                    8607bfda5152ce3c1384b3094e04049457588a592fb2514d0985397b04a952bcf5946549e8c17a56bb490cd4a812047fb3fc137d2386e5579a8409872853d8f5

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmn76s94.exe

                    Filesize

                    366KB

                    MD5

                    1d5e9832b28ec47f1fa336c0654661a7

                    SHA1

                    eb23c90e8fd8c178e6f723e3c4752a299b73893b

                    SHA256

                    1e275cb439d6f986a716b05946e636719cf5818a06ac062f7a4920c3e140aa78

                    SHA512

                    c5c45a47dcbba307953c393ab7c96b042837b9e9b78b72cf3686851c383d2ad45cea5998e5285befda73fea1609c828c26232159abea97cceb53773aa02395c7

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmn76s94.exe

                    Filesize

                    366KB

                    MD5

                    1d5e9832b28ec47f1fa336c0654661a7

                    SHA1

                    eb23c90e8fd8c178e6f723e3c4752a299b73893b

                    SHA256

                    1e275cb439d6f986a716b05946e636719cf5818a06ac062f7a4920c3e140aa78

                    SHA512

                    c5c45a47dcbba307953c393ab7c96b042837b9e9b78b72cf3686851c383d2ad45cea5998e5285befda73fea1609c828c26232159abea97cceb53773aa02395c7

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3465.exe

                    Filesize

                    354KB

                    MD5

                    5ed5c030c00db7a29840cf5a72731b1e

                    SHA1

                    63cee479530c49b9c6f7897b196ba1b06ffb731d

                    SHA256

                    555ab71f81d77332319a3abb8cd05e588aed423f040dacafd87a9bac84947c1f

                    SHA512

                    67734fe7d5646fbe1b50b2c55696ad40cb5eb985ef784ede9335f6f8b31dac4adf73bd47c0d7d267fbe0ab8d594386ef0ce0c7358dbb8404998ab9839f75df43

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3465.exe

                    Filesize

                    354KB

                    MD5

                    5ed5c030c00db7a29840cf5a72731b1e

                    SHA1

                    63cee479530c49b9c6f7897b196ba1b06ffb731d

                    SHA256

                    555ab71f81d77332319a3abb8cd05e588aed423f040dacafd87a9bac84947c1f

                    SHA512

                    67734fe7d5646fbe1b50b2c55696ad40cb5eb985ef784ede9335f6f8b31dac4adf73bd47c0d7d267fbe0ab8d594386ef0ce0c7358dbb8404998ab9839f75df43

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu055069.exe

                    Filesize

                    13KB

                    MD5

                    60aa6088f75cefccbb557a769cfd682d

                    SHA1

                    e4bd8bef423b04aa9185de6c6efc257861efd19a

                    SHA256

                    c3ee7ae9aa11594f9ad00826c5b97f6ec70d3f4807540fc4444b4259fe2b9049

                    SHA512

                    0f69fe2c76b9d7ab187ec1b717feef56a04cd73a8beadf1e01b05456b03b8320a6a08b746e2cf2608b58c3e148a78e22b0e96dbb02cecaa4cfa3eb73f1b887ef

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu055069.exe

                    Filesize

                    13KB

                    MD5

                    60aa6088f75cefccbb557a769cfd682d

                    SHA1

                    e4bd8bef423b04aa9185de6c6efc257861efd19a

                    SHA256

                    c3ee7ae9aa11594f9ad00826c5b97f6ec70d3f4807540fc4444b4259fe2b9049

                    SHA512

                    0f69fe2c76b9d7ab187ec1b717feef56a04cd73a8beadf1e01b05456b03b8320a6a08b746e2cf2608b58c3e148a78e22b0e96dbb02cecaa4cfa3eb73f1b887ef

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0777.exe

                    Filesize

                    307KB

                    MD5

                    abec1d48651c9d07e005fd0a3884bcec

                    SHA1

                    16ce8bc3ec739e7d526d3f68c0d20f8388e18af3

                    SHA256

                    4a5a7b18976e2bd7a9b11c4967d0219bda2b88d50944cd02f0a62c71c526ccbb

                    SHA512

                    705dd26a19787ecb97c20ae927c79feec31819b2c857b223c5f1934c635ac9fda60032fdd2064f0d2fe9a1b5de232038b0768b3a9b52df96fc37257df1b25781

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0777.exe

                    Filesize

                    307KB

                    MD5

                    abec1d48651c9d07e005fd0a3884bcec

                    SHA1

                    16ce8bc3ec739e7d526d3f68c0d20f8388e18af3

                    SHA256

                    4a5a7b18976e2bd7a9b11c4967d0219bda2b88d50944cd02f0a62c71c526ccbb

                    SHA512

                    705dd26a19787ecb97c20ae927c79feec31819b2c857b223c5f1934c635ac9fda60032fdd2064f0d2fe9a1b5de232038b0768b3a9b52df96fc37257df1b25781

                  • memory/640-1140-0x0000000005A10000-0x0000000005A20000-memory.dmp

                    Filesize

                    64KB

                  • memory/640-1139-0x0000000000CD0000-0x0000000000D02000-memory.dmp

                    Filesize

                    200KB

                  • memory/2268-161-0x0000000000E80000-0x0000000000E8A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2356-1120-0x0000000005A50000-0x0000000005B5A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/2356-237-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-1133-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/2356-1132-0x00000000070E0000-0x0000000007130000-memory.dmp

                    Filesize

                    320KB

                  • memory/2356-1131-0x0000000007060000-0x00000000070D6000-memory.dmp

                    Filesize

                    472KB

                  • memory/2356-1130-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/2356-1129-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/2356-1128-0x00000000067A0000-0x0000000006CCC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/2356-1127-0x00000000065D0000-0x0000000006792000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/2356-1125-0x0000000005EB0000-0x0000000005F16000-memory.dmp

                    Filesize

                    408KB

                  • memory/2356-1124-0x0000000005E10000-0x0000000005EA2000-memory.dmp

                    Filesize

                    584KB

                  • memory/2356-1123-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/2356-1122-0x0000000004E30000-0x0000000004E6C000-memory.dmp

                    Filesize

                    240KB

                  • memory/2356-1121-0x0000000004E10000-0x0000000004E22000-memory.dmp

                    Filesize

                    72KB

                  • memory/2356-1119-0x0000000005430000-0x0000000005A48000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/2356-211-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-210-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-213-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-215-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-217-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-219-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-221-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-223-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-225-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-227-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-229-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-231-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-233-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-235-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-294-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/2356-239-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-241-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-243-0x0000000002870000-0x00000000028AF000-memory.dmp

                    Filesize

                    252KB

                  • memory/2356-292-0x0000000004E70000-0x0000000004E80000-memory.dmp

                    Filesize

                    64KB

                  • memory/2356-290-0x00000000007F0000-0x000000000083B000-memory.dmp

                    Filesize

                    300KB

                  • memory/4368-196-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-205-0x0000000000400000-0x0000000000710000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4368-190-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-188-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-194-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-204-0x0000000005050000-0x0000000005060000-memory.dmp

                    Filesize

                    64KB

                  • memory/4368-203-0x0000000005050000-0x0000000005060000-memory.dmp

                    Filesize

                    64KB

                  • memory/4368-192-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-200-0x0000000000400000-0x0000000000710000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4368-199-0x0000000005050000-0x0000000005060000-memory.dmp

                    Filesize

                    64KB

                  • memory/4368-198-0x0000000005050000-0x0000000005060000-memory.dmp

                    Filesize

                    64KB

                  • memory/4368-197-0x0000000005050000-0x0000000005060000-memory.dmp

                    Filesize

                    64KB

                  • memory/4368-184-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-186-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-202-0x0000000005050000-0x0000000005060000-memory.dmp

                    Filesize

                    64KB

                  • memory/4368-182-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-180-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-178-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-176-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-174-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-172-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-170-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-169-0x00000000025A0000-0x00000000025B2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4368-168-0x0000000005060000-0x0000000005604000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4368-167-0x0000000000710000-0x000000000073D000-memory.dmp

                    Filesize

                    180KB