Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:11

General

  • Target

    f803291b578153737b87ba56a03657db.exe

  • Size

    1004KB

  • MD5

    f803291b578153737b87ba56a03657db

  • SHA1

    e094bc701af7daf4a6f4316ade513161fb54747f

  • SHA256

    5f4fe3de23838b203748f945594fe89c7c399ce04cd178d16a747140b313b11b

  • SHA512

    2932e8302c344fae30126399c7669b76fe67054d838c50eed46b0e13f1b54db8b9680013a42e9d96a459541d5bb2ee941d5f8ebcc299e34dfad1242ee6fa265a

  • SSDEEP

    24576:wyWA7vqttipNT1ga5sDDs0tmJNgJ1agtKGjZZH2:32tgnT+aC0ymUHwGd

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f803291b578153737b87ba56a03657db.exe
    "C:\Users\Admin\AppData\Local\Temp\f803291b578153737b87ba56a03657db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1857.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1857.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6743.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6743.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4284
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0335.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0335.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4740
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu511043.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu511043.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4324
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1537.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1537.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4828
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 1084
              6⤵
              • Program crash
              PID:4180
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSf60s74.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSf60s74.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4164
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 1348
            5⤵
            • Program crash
            PID:4128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en999025.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en999025.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge734968.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge734968.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3632
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3300
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4376
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2808
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:3728
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3392
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2920
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4680
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:3336
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4828 -ip 4828
                1⤵
                  PID:4960
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4164 -ip 4164
                  1⤵
                    PID:532
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3688
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3404

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    0006ded149b67a9112a99ed4618bd493

                    SHA1

                    1103df30ae8db096f94149fac3fd27c30ec4c621

                    SHA256

                    6d4e29e2fd9f986a531c3b99cc3b0a623f1fb2a545d5ab2892fac17629d23d14

                    SHA512

                    5952bb0079792de8bebd8bb96cb2b07b85cca9c1126a6110bd6146557aa491b85fe3f47549858de3e490c597494eb691914e66fb4d48fbf1ccaedcaf8bcc816c

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    0006ded149b67a9112a99ed4618bd493

                    SHA1

                    1103df30ae8db096f94149fac3fd27c30ec4c621

                    SHA256

                    6d4e29e2fd9f986a531c3b99cc3b0a623f1fb2a545d5ab2892fac17629d23d14

                    SHA512

                    5952bb0079792de8bebd8bb96cb2b07b85cca9c1126a6110bd6146557aa491b85fe3f47549858de3e490c597494eb691914e66fb4d48fbf1ccaedcaf8bcc816c

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    0006ded149b67a9112a99ed4618bd493

                    SHA1

                    1103df30ae8db096f94149fac3fd27c30ec4c621

                    SHA256

                    6d4e29e2fd9f986a531c3b99cc3b0a623f1fb2a545d5ab2892fac17629d23d14

                    SHA512

                    5952bb0079792de8bebd8bb96cb2b07b85cca9c1126a6110bd6146557aa491b85fe3f47549858de3e490c597494eb691914e66fb4d48fbf1ccaedcaf8bcc816c

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    0006ded149b67a9112a99ed4618bd493

                    SHA1

                    1103df30ae8db096f94149fac3fd27c30ec4c621

                    SHA256

                    6d4e29e2fd9f986a531c3b99cc3b0a623f1fb2a545d5ab2892fac17629d23d14

                    SHA512

                    5952bb0079792de8bebd8bb96cb2b07b85cca9c1126a6110bd6146557aa491b85fe3f47549858de3e490c597494eb691914e66fb4d48fbf1ccaedcaf8bcc816c

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    0006ded149b67a9112a99ed4618bd493

                    SHA1

                    1103df30ae8db096f94149fac3fd27c30ec4c621

                    SHA256

                    6d4e29e2fd9f986a531c3b99cc3b0a623f1fb2a545d5ab2892fac17629d23d14

                    SHA512

                    5952bb0079792de8bebd8bb96cb2b07b85cca9c1126a6110bd6146557aa491b85fe3f47549858de3e490c597494eb691914e66fb4d48fbf1ccaedcaf8bcc816c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge734968.exe

                    Filesize

                    227KB

                    MD5

                    0006ded149b67a9112a99ed4618bd493

                    SHA1

                    1103df30ae8db096f94149fac3fd27c30ec4c621

                    SHA256

                    6d4e29e2fd9f986a531c3b99cc3b0a623f1fb2a545d5ab2892fac17629d23d14

                    SHA512

                    5952bb0079792de8bebd8bb96cb2b07b85cca9c1126a6110bd6146557aa491b85fe3f47549858de3e490c597494eb691914e66fb4d48fbf1ccaedcaf8bcc816c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge734968.exe

                    Filesize

                    227KB

                    MD5

                    0006ded149b67a9112a99ed4618bd493

                    SHA1

                    1103df30ae8db096f94149fac3fd27c30ec4c621

                    SHA256

                    6d4e29e2fd9f986a531c3b99cc3b0a623f1fb2a545d5ab2892fac17629d23d14

                    SHA512

                    5952bb0079792de8bebd8bb96cb2b07b85cca9c1126a6110bd6146557aa491b85fe3f47549858de3e490c597494eb691914e66fb4d48fbf1ccaedcaf8bcc816c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1857.exe

                    Filesize

                    822KB

                    MD5

                    ff0c7f0cb29ddc3081d62245cb1c50a5

                    SHA1

                    81e06c952fa4b3d1ff971478b7cc90d8e0575a4e

                    SHA256

                    9d405d99ebbe10f5ba1df70fda479efe96eaf2343fe569d75cb973d51fb1aef2

                    SHA512

                    b714cb9e1bd400fd9a41e8613b97ed3a936dd2e41e730aa525e9842ee28bc4817cd76a555df3b761c92501834b94841140871d50ded286d576640673544880b2

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1857.exe

                    Filesize

                    822KB

                    MD5

                    ff0c7f0cb29ddc3081d62245cb1c50a5

                    SHA1

                    81e06c952fa4b3d1ff971478b7cc90d8e0575a4e

                    SHA256

                    9d405d99ebbe10f5ba1df70fda479efe96eaf2343fe569d75cb973d51fb1aef2

                    SHA512

                    b714cb9e1bd400fd9a41e8613b97ed3a936dd2e41e730aa525e9842ee28bc4817cd76a555df3b761c92501834b94841140871d50ded286d576640673544880b2

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en999025.exe

                    Filesize

                    175KB

                    MD5

                    9b5178c1a38a2d88f88ae5b92ebfe64d

                    SHA1

                    84007b8047b87d594c0f419b1c111965e9dba3d0

                    SHA256

                    aeb4c835eb46d1288560ea93db933f9d97bae98ea7db34d83b9cf38dd62d9f19

                    SHA512

                    dc4e2378528c053744174b1ad042e0bc2594ddf06bb94626f1fff9241ce2a53c9733fb0e8764d4bbd2c8d939070b091e45adf2bf49adf1b47963021605cb892b

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en999025.exe

                    Filesize

                    175KB

                    MD5

                    9b5178c1a38a2d88f88ae5b92ebfe64d

                    SHA1

                    84007b8047b87d594c0f419b1c111965e9dba3d0

                    SHA256

                    aeb4c835eb46d1288560ea93db933f9d97bae98ea7db34d83b9cf38dd62d9f19

                    SHA512

                    dc4e2378528c053744174b1ad042e0bc2594ddf06bb94626f1fff9241ce2a53c9733fb0e8764d4bbd2c8d939070b091e45adf2bf49adf1b47963021605cb892b

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6743.exe

                    Filesize

                    681KB

                    MD5

                    661f31d005a809df93adc78daf9e56ff

                    SHA1

                    ea772734b417baa31ca98845e97ba603236f4fe1

                    SHA256

                    d87b88358e1df939aaedd2d78b42939c106f8cda2f0f8fe0a66245ef23e3e9cf

                    SHA512

                    21bab297e356ff69d583b201d5b732eb26ec43651229fbf9f23cf915666d72ab2480528bf6116d6564dd5b64624d1a2e8c3abf1a3b9bbcd367b3ff4771e06401

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6743.exe

                    Filesize

                    681KB

                    MD5

                    661f31d005a809df93adc78daf9e56ff

                    SHA1

                    ea772734b417baa31ca98845e97ba603236f4fe1

                    SHA256

                    d87b88358e1df939aaedd2d78b42939c106f8cda2f0f8fe0a66245ef23e3e9cf

                    SHA512

                    21bab297e356ff69d583b201d5b732eb26ec43651229fbf9f23cf915666d72ab2480528bf6116d6564dd5b64624d1a2e8c3abf1a3b9bbcd367b3ff4771e06401

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSf60s74.exe

                    Filesize

                    345KB

                    MD5

                    14792ece4b4618b25bb8b552bbd56304

                    SHA1

                    4f29aa75c79a453acd88c844eab37bad43239ac4

                    SHA256

                    7fa76279185a193989beef716a4d94f1d6e24c1355b93e59f0cd7ddb5f2e9efd

                    SHA512

                    8bf1c7fd1ba3c8057d06f31dc73c499d163eaa0fa2fa290b68b112bf5c92e4d440006d7f88d4c1ecc69be7285a579f951e2c6495700c0adb59f96a96fb27fde9

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSf60s74.exe

                    Filesize

                    345KB

                    MD5

                    14792ece4b4618b25bb8b552bbd56304

                    SHA1

                    4f29aa75c79a453acd88c844eab37bad43239ac4

                    SHA256

                    7fa76279185a193989beef716a4d94f1d6e24c1355b93e59f0cd7ddb5f2e9efd

                    SHA512

                    8bf1c7fd1ba3c8057d06f31dc73c499d163eaa0fa2fa290b68b112bf5c92e4d440006d7f88d4c1ecc69be7285a579f951e2c6495700c0adb59f96a96fb27fde9

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0335.exe

                    Filesize

                    344KB

                    MD5

                    a1c086e6f3b76f2aac2884b69485ce23

                    SHA1

                    efeb08be769f348c6e8b97e6e4552fd927cedfeb

                    SHA256

                    2fdc7937c6144f4c1ce7546868145123691b12e1ef2a002cc1de9fb7024e51a2

                    SHA512

                    c6fa6e9db8ce95a77cef8e2852e035bb2c0702164b069427af3974b428a5127e95a39b22619c6e0ff6954d70980945ed33f73dfd8508e1669699d54c140dfc02

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina0335.exe

                    Filesize

                    344KB

                    MD5

                    a1c086e6f3b76f2aac2884b69485ce23

                    SHA1

                    efeb08be769f348c6e8b97e6e4552fd927cedfeb

                    SHA256

                    2fdc7937c6144f4c1ce7546868145123691b12e1ef2a002cc1de9fb7024e51a2

                    SHA512

                    c6fa6e9db8ce95a77cef8e2852e035bb2c0702164b069427af3974b428a5127e95a39b22619c6e0ff6954d70980945ed33f73dfd8508e1669699d54c140dfc02

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu511043.exe

                    Filesize

                    11KB

                    MD5

                    c8acd4162ee1ca45f5ce6692fd99292a

                    SHA1

                    17cbbac4adf10d433ad103fe7313eb77f8fc5257

                    SHA256

                    5c36cd4c6a184f4435488d987301fc17d16ef4ed3916dcba292dc8eb5d43ed1b

                    SHA512

                    3c2d3d613ea73a7f1ca04e48d51d0655c1892404a52efca70f60bed72137aa00054893389b19af13b1fa73edce7f4d5f83643a8d962110db054e8eb86b5daa90

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu511043.exe

                    Filesize

                    11KB

                    MD5

                    c8acd4162ee1ca45f5ce6692fd99292a

                    SHA1

                    17cbbac4adf10d433ad103fe7313eb77f8fc5257

                    SHA256

                    5c36cd4c6a184f4435488d987301fc17d16ef4ed3916dcba292dc8eb5d43ed1b

                    SHA512

                    3c2d3d613ea73a7f1ca04e48d51d0655c1892404a52efca70f60bed72137aa00054893389b19af13b1fa73edce7f4d5f83643a8d962110db054e8eb86b5daa90

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1537.exe

                    Filesize

                    291KB

                    MD5

                    91d7b8fbc90cbb7f5682b095879ca40b

                    SHA1

                    053807c780c9634f847bb74681e7690f8e9449f2

                    SHA256

                    d52a476fe21639c75e1f13557a593103504d0a7523d4dbff01fe36ae9f238bbf

                    SHA512

                    ec2ca2fe1d7e9553ee631fb7e8259babd1b50cc7e0df4ea351d083c445aefdff249443f511d69c84393dd38b708401e51269fec5f0364248db3c4983414be77a

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1537.exe

                    Filesize

                    291KB

                    MD5

                    91d7b8fbc90cbb7f5682b095879ca40b

                    SHA1

                    053807c780c9634f847bb74681e7690f8e9449f2

                    SHA256

                    d52a476fe21639c75e1f13557a593103504d0a7523d4dbff01fe36ae9f238bbf

                    SHA512

                    ec2ca2fe1d7e9553ee631fb7e8259babd1b50cc7e0df4ea351d083c445aefdff249443f511d69c84393dd38b708401e51269fec5f0364248db3c4983414be77a

                  • memory/3268-1143-0x0000000004F70000-0x0000000004F80000-memory.dmp

                    Filesize

                    64KB

                  • memory/3268-1142-0x0000000000700000-0x0000000000732000-memory.dmp

                    Filesize

                    200KB

                  • memory/4164-1124-0x00000000037F0000-0x0000000003800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4164-242-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-1136-0x00000000037F0000-0x0000000003800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4164-1135-0x00000000037F0000-0x0000000003800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4164-1134-0x00000000037F0000-0x0000000003800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4164-1133-0x00000000037F0000-0x0000000003800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4164-1132-0x0000000007BA0000-0x00000000080CC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/4164-1131-0x00000000079C0000-0x0000000007B82000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/4164-1129-0x0000000007950000-0x00000000079A0000-memory.dmp

                    Filesize

                    320KB

                  • memory/4164-1128-0x00000000078B0000-0x0000000007926000-memory.dmp

                    Filesize

                    472KB

                  • memory/4164-1127-0x00000000071C0000-0x0000000007226000-memory.dmp

                    Filesize

                    408KB

                  • memory/4164-1126-0x0000000007120000-0x00000000071B2000-memory.dmp

                    Filesize

                    584KB

                  • memory/4164-1125-0x0000000006E30000-0x0000000006E6C000-memory.dmp

                    Filesize

                    240KB

                  • memory/4164-1123-0x0000000006E10000-0x0000000006E22000-memory.dmp

                    Filesize

                    72KB

                  • memory/4164-1122-0x0000000006CF0000-0x0000000006DFA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/4164-1121-0x00000000066D0000-0x0000000006CE8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/4164-211-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-214-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-212-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-216-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-218-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-220-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-224-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-222-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-226-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-228-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-230-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-234-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-232-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-236-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-239-0x0000000001B00000-0x0000000001B4B000-memory.dmp

                    Filesize

                    300KB

                  • memory/4164-238-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4164-241-0x00000000037F0000-0x0000000003800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4164-243-0x00000000037F0000-0x0000000003800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4164-245-0x00000000037F0000-0x0000000003800000-memory.dmp

                    Filesize

                    64KB

                  • memory/4164-246-0x0000000003BF0000-0x0000000003C2F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4324-163-0x000000001B4B0000-0x000000001B5FE000-memory.dmp

                    Filesize

                    1.3MB

                  • memory/4324-161-0x0000000000900000-0x000000000090A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4828-194-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-203-0x0000000002620000-0x0000000002630000-memory.dmp

                    Filesize

                    64KB

                  • memory/4828-190-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-204-0x0000000002620000-0x0000000002630000-memory.dmp

                    Filesize

                    64KB

                  • memory/4828-188-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-202-0x0000000002620000-0x0000000002630000-memory.dmp

                    Filesize

                    64KB

                  • memory/4828-201-0x0000000000400000-0x000000000070B000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/4828-178-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-198-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-196-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-186-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-192-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-180-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-206-0x0000000000400000-0x000000000070B000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/4828-200-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-176-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-174-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-173-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-172-0x0000000002620000-0x0000000002630000-memory.dmp

                    Filesize

                    64KB

                  • memory/4828-171-0x0000000002620000-0x0000000002630000-memory.dmp

                    Filesize

                    64KB

                  • memory/4828-170-0x0000000002620000-0x0000000002630000-memory.dmp

                    Filesize

                    64KB

                  • memory/4828-169-0x0000000000830000-0x000000000085D000-memory.dmp

                    Filesize

                    180KB

                  • memory/4828-168-0x0000000004D80000-0x0000000005324000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4828-184-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB

                  • memory/4828-182-0x0000000002840000-0x0000000002852000-memory.dmp

                    Filesize

                    72KB