Analysis

  • max time kernel
    115s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 03:36

General

  • Target

    93aac18b6e6ffc67fe291ea83931f263.exe

  • Size

    1005KB

  • MD5

    93aac18b6e6ffc67fe291ea83931f263

  • SHA1

    6a4a453913b32618867e9da9cb3388853d458252

  • SHA256

    78031c2c942873e2861368be982040620f8efa70827e547aca028ab8a642fb18

  • SHA512

    56e5cb779d360887c4a252b7c8b9fb2ab0e293b4b3848583c27586b54dee2447793a779de52c4b3a5a4070141f3eabe69615d8e3f7059810bc8f61881e1da876

  • SSDEEP

    24576:MydXqtKPl6ROooNfrM5WFQFIaPsI5sMPA01L0u0agCSPChhXH:7dXjl6R3oNzjQaaFPA6TQTPW

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93aac18b6e6ffc67fe291ea83931f263.exe
    "C:\Users\Admin\AppData\Local\Temp\93aac18b6e6ffc67fe291ea83931f263.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7391.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7391.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1584.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1584.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:412
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1344.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1344.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3164
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu487953.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu487953.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2056
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1363.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1363.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4688
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 1080
              6⤵
              • Program crash
              PID:944
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVE20s90.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVE20s90.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5072
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 1892
            5⤵
            • Program crash
            PID:4440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en071946.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en071946.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258044.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258044.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2160
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4216
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4240
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1436
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:1820
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:2932
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:408
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4692
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:1956
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4688 -ip 4688
                1⤵
                  PID:3476
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5072 -ip 5072
                  1⤵
                    PID:5076
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3412

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    97bdcacc3821fd459e6457f7a2a087a8

                    SHA1

                    28f71578418a34e296c20538691a78f9d1831946

                    SHA256

                    fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                    SHA512

                    faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    97bdcacc3821fd459e6457f7a2a087a8

                    SHA1

                    28f71578418a34e296c20538691a78f9d1831946

                    SHA256

                    fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                    SHA512

                    faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    97bdcacc3821fd459e6457f7a2a087a8

                    SHA1

                    28f71578418a34e296c20538691a78f9d1831946

                    SHA256

                    fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                    SHA512

                    faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    97bdcacc3821fd459e6457f7a2a087a8

                    SHA1

                    28f71578418a34e296c20538691a78f9d1831946

                    SHA256

                    fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                    SHA512

                    faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258044.exe

                    Filesize

                    227KB

                    MD5

                    97bdcacc3821fd459e6457f7a2a087a8

                    SHA1

                    28f71578418a34e296c20538691a78f9d1831946

                    SHA256

                    fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                    SHA512

                    faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge258044.exe

                    Filesize

                    227KB

                    MD5

                    97bdcacc3821fd459e6457f7a2a087a8

                    SHA1

                    28f71578418a34e296c20538691a78f9d1831946

                    SHA256

                    fcd4446aa34374a8a21311a06fe51860e9d9152724dafd4cbff767ad14015aa0

                    SHA512

                    faebc8863f39eaf73987907a4b576f0c8a41aef3d7598bc02f1dbd3be694cf140ef5f84a03e0321646d125390aba7a2056591f05126ce4d0e6c1dab79441d2df

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7391.exe

                    Filesize

                    823KB

                    MD5

                    26e17f3a8978f0b4e5fed6f1b8eefedf

                    SHA1

                    8f106beb62fc23fc840a8a2fec8465d095c85066

                    SHA256

                    f9e5a96484285d8cfb05fac286d69bd106ead9aa48a62fe8b1bfbdd02ddc85c3

                    SHA512

                    b9df83ae2ee48e6836886641a3964e0bfa6e1ad6c83690967555d74cc05b0d46c9296d49b805e31c32066a801b6d0a74c2c5105f5a951b56239239e85417ef82

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7391.exe

                    Filesize

                    823KB

                    MD5

                    26e17f3a8978f0b4e5fed6f1b8eefedf

                    SHA1

                    8f106beb62fc23fc840a8a2fec8465d095c85066

                    SHA256

                    f9e5a96484285d8cfb05fac286d69bd106ead9aa48a62fe8b1bfbdd02ddc85c3

                    SHA512

                    b9df83ae2ee48e6836886641a3964e0bfa6e1ad6c83690967555d74cc05b0d46c9296d49b805e31c32066a801b6d0a74c2c5105f5a951b56239239e85417ef82

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en071946.exe

                    Filesize

                    175KB

                    MD5

                    2dc393e4c6f80a19fe01d610974f9d1b

                    SHA1

                    d6f4798025f62b0134c82c01745e3a5f7dba3f70

                    SHA256

                    a1063cf62e34e4fa89f85ed64ff74967026c5f1a9f6370dc6d7a15045f38afc6

                    SHA512

                    d5c273c5d4d0bba2a8bd067c25e40ec6e0ce11badac9bb1bdb92f58402352a9de651a0e92d203ae76f7382696bb68eb32d2b4fee8be61a921f7b4b0bde676a3d

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en071946.exe

                    Filesize

                    175KB

                    MD5

                    2dc393e4c6f80a19fe01d610974f9d1b

                    SHA1

                    d6f4798025f62b0134c82c01745e3a5f7dba3f70

                    SHA256

                    a1063cf62e34e4fa89f85ed64ff74967026c5f1a9f6370dc6d7a15045f38afc6

                    SHA512

                    d5c273c5d4d0bba2a8bd067c25e40ec6e0ce11badac9bb1bdb92f58402352a9de651a0e92d203ae76f7382696bb68eb32d2b4fee8be61a921f7b4b0bde676a3d

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1584.exe

                    Filesize

                    680KB

                    MD5

                    14b54bb65d518d91cf3bb40d53d937fb

                    SHA1

                    ad88f1f76e0b4d4da7a824572915653e603f2516

                    SHA256

                    ed389a7be41cc3f4907fea284af9b373d14be47f55d2755efe55fc3cb4a4a66e

                    SHA512

                    d4c9693804be3fb36900e4b522974e44d9ae81d0d6edfd558d412f03067ac15506da94c4b2254910f8ebacc4b1c88892da5da923701cd172b841a23d283d6a1f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1584.exe

                    Filesize

                    680KB

                    MD5

                    14b54bb65d518d91cf3bb40d53d937fb

                    SHA1

                    ad88f1f76e0b4d4da7a824572915653e603f2516

                    SHA256

                    ed389a7be41cc3f4907fea284af9b373d14be47f55d2755efe55fc3cb4a4a66e

                    SHA512

                    d4c9693804be3fb36900e4b522974e44d9ae81d0d6edfd558d412f03067ac15506da94c4b2254910f8ebacc4b1c88892da5da923701cd172b841a23d283d6a1f

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVE20s90.exe

                    Filesize

                    345KB

                    MD5

                    814af8c0794b811be356a17f5d39895e

                    SHA1

                    9d03734b888d9a3863dc64ab1d016fbb66a0e3eb

                    SHA256

                    0b94a0ddbcca4e4074109790abb50dbe42fffa647880dfd7942dd0790e44e4b7

                    SHA512

                    61625d0bdd285091f7c0868aa80d516c251f7dc02221da1146cd83757a46e6e464a9c8eeb508aad3c8aaedeced673f2b0b7b9aa2b1140799d9a588b386f08088

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVE20s90.exe

                    Filesize

                    345KB

                    MD5

                    814af8c0794b811be356a17f5d39895e

                    SHA1

                    9d03734b888d9a3863dc64ab1d016fbb66a0e3eb

                    SHA256

                    0b94a0ddbcca4e4074109790abb50dbe42fffa647880dfd7942dd0790e44e4b7

                    SHA512

                    61625d0bdd285091f7c0868aa80d516c251f7dc02221da1146cd83757a46e6e464a9c8eeb508aad3c8aaedeced673f2b0b7b9aa2b1140799d9a588b386f08088

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1344.exe

                    Filesize

                    344KB

                    MD5

                    f546c4389a032b2dd2febb12df1c1ca6

                    SHA1

                    96665e593f6fd6f13af0020a86b2d32a179be9ee

                    SHA256

                    f4eee7b851d88a2b0b359996cb76531700c8ecbb1aa4d6cfdefb3c552d72081b

                    SHA512

                    cc533474958d02b8ea300859a5b5de013d1ed5dfa862dc5b8146e3e305b9c6a591780e68271af4e65bca9a0cbd8ad57ba2ca88d9db32b39a2414c61f7395e35c

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1344.exe

                    Filesize

                    344KB

                    MD5

                    f546c4389a032b2dd2febb12df1c1ca6

                    SHA1

                    96665e593f6fd6f13af0020a86b2d32a179be9ee

                    SHA256

                    f4eee7b851d88a2b0b359996cb76531700c8ecbb1aa4d6cfdefb3c552d72081b

                    SHA512

                    cc533474958d02b8ea300859a5b5de013d1ed5dfa862dc5b8146e3e305b9c6a591780e68271af4e65bca9a0cbd8ad57ba2ca88d9db32b39a2414c61f7395e35c

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu487953.exe

                    Filesize

                    11KB

                    MD5

                    82b98158665b1bfe11dc9be36127a2f2

                    SHA1

                    e9b403d593ce88625a1d2d7400d05a1e68a7bff9

                    SHA256

                    86a5ad70791b6ab7415847566400a8421a03d7afddb4480d0ef91abb9756aae9

                    SHA512

                    5deb2dd57bbc77d09f84a45376f55f80545e07bb759afe7d9d3aef72049de96ea718a0294830ff960c19f11a51233eadb41e2210c1e36237647e2a7938719285

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu487953.exe

                    Filesize

                    11KB

                    MD5

                    82b98158665b1bfe11dc9be36127a2f2

                    SHA1

                    e9b403d593ce88625a1d2d7400d05a1e68a7bff9

                    SHA256

                    86a5ad70791b6ab7415847566400a8421a03d7afddb4480d0ef91abb9756aae9

                    SHA512

                    5deb2dd57bbc77d09f84a45376f55f80545e07bb759afe7d9d3aef72049de96ea718a0294830ff960c19f11a51233eadb41e2210c1e36237647e2a7938719285

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1363.exe

                    Filesize

                    291KB

                    MD5

                    74ef7e79db171f8336a407dbcf60f9f6

                    SHA1

                    ce6300a0630e0e46e078ce87795b136eff059d0e

                    SHA256

                    f84c0fab7dba87ba382f1fd5ad75ec378cf62cef4312f6344153e280c247d33c

                    SHA512

                    882993c12d815ba63f6c83f659bccb06b31259acd4c6bbb3f24adc2b1061cc95f15e156f30860fca2d9ba8edccf4ce5c5cdd21583f19e2583c5522adc6f7d03c

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1363.exe

                    Filesize

                    291KB

                    MD5

                    74ef7e79db171f8336a407dbcf60f9f6

                    SHA1

                    ce6300a0630e0e46e078ce87795b136eff059d0e

                    SHA256

                    f84c0fab7dba87ba382f1fd5ad75ec378cf62cef4312f6344153e280c247d33c

                    SHA512

                    882993c12d815ba63f6c83f659bccb06b31259acd4c6bbb3f24adc2b1061cc95f15e156f30860fca2d9ba8edccf4ce5c5cdd21583f19e2583c5522adc6f7d03c

                  • memory/2056-161-0x00000000000D0000-0x00000000000DA000-memory.dmp

                    Filesize

                    40KB

                  • memory/4688-175-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-199-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-177-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-179-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-181-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-183-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-185-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-187-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-189-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-191-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-193-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-195-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-197-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-167-0x0000000004EF0000-0x0000000005494000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4688-200-0x0000000000400000-0x000000000070B000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/4688-201-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4688-202-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4688-204-0x0000000000400000-0x000000000070B000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/4688-173-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-172-0x0000000002620000-0x0000000002632000-memory.dmp

                    Filesize

                    72KB

                  • memory/4688-171-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4688-170-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4688-169-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4688-168-0x0000000000710000-0x000000000073D000-memory.dmp

                    Filesize

                    180KB

                  • memory/4772-1140-0x00000000004D0000-0x0000000000502000-memory.dmp

                    Filesize

                    200KB

                  • memory/4772-1141-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5072-210-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-226-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-228-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-230-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-232-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-234-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-236-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-238-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-240-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-242-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-335-0x0000000001B80000-0x0000000001BCB000-memory.dmp

                    Filesize

                    300KB

                  • memory/5072-338-0x00000000039D0000-0x00000000039E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5072-340-0x00000000039D0000-0x00000000039E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5072-1118-0x0000000006790000-0x0000000006DA8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/5072-1119-0x0000000006E10000-0x0000000006F1A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/5072-1120-0x0000000006F50000-0x0000000006F62000-memory.dmp

                    Filesize

                    72KB

                  • memory/5072-1121-0x00000000039D0000-0x00000000039E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5072-1122-0x0000000006F70000-0x0000000006FAC000-memory.dmp

                    Filesize

                    240KB

                  • memory/5072-1123-0x0000000007260000-0x00000000072F2000-memory.dmp

                    Filesize

                    584KB

                  • memory/5072-1124-0x0000000007300000-0x0000000007366000-memory.dmp

                    Filesize

                    408KB

                  • memory/5072-1126-0x0000000007C60000-0x0000000007CD6000-memory.dmp

                    Filesize

                    472KB

                  • memory/5072-1127-0x0000000007CE0000-0x0000000007D30000-memory.dmp

                    Filesize

                    320KB

                  • memory/5072-1128-0x00000000039D0000-0x00000000039E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5072-1129-0x00000000039D0000-0x00000000039E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5072-1130-0x00000000039D0000-0x00000000039E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/5072-224-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-222-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-220-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-218-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-216-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-214-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-212-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-209-0x0000000003980000-0x00000000039BF000-memory.dmp

                    Filesize

                    252KB

                  • memory/5072-1131-0x0000000007E90000-0x0000000008052000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/5072-1132-0x0000000008070000-0x000000000859C000-memory.dmp

                    Filesize

                    5.2MB