Analysis

  • max time kernel
    122s
  • max time network
    119s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 05:08

General

  • Target

    449365038a093edc61757387a197ec8e5abea4ce79bcd96ee8ddc248a4c0f0c9.exe

  • Size

    1005KB

  • MD5

    76412d671db4644a93b7e319b96e7107

  • SHA1

    f1e4cf62a5a615a209a1cfe6168dac77528f682b

  • SHA256

    449365038a093edc61757387a197ec8e5abea4ce79bcd96ee8ddc248a4c0f0c9

  • SHA512

    030ca6ad488b3017cbc6b4c9543dc126d779c497f7f46f087115a3810c7500eb700d1db7b8a6a30ea288c4264b27680092c5c4a6607039a6bde9f6b343be3bd3

  • SSDEEP

    24576:ZyO0x0ixwVaqB5PXSq2qYtn3+3aE3eB/y1awHA:MOi0ikUqfVlO2aQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\449365038a093edc61757387a197ec8e5abea4ce79bcd96ee8ddc248a4c0f0c9.exe
    "C:\Users\Admin\AppData\Local\Temp\449365038a093edc61757387a197ec8e5abea4ce79bcd96ee8ddc248a4c0f0c9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3195.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3195.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3820.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3820.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5158.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5158.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4824
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu455143.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu455143.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4772
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2289.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2289.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3552
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEA54s36.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEA54s36.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en570646.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en570646.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge574690.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge574690.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4388
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4468
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4696
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4940
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4892
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4672
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4684
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:5072
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4916
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4896
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4832

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                06e3b166aa220481afbdefb57f2c10ef

                SHA1

                5f6bcbad753b210060a30ef90eaeaa9549082213

                SHA256

                0e0a6836c94d9b38954da8f1c73d151137daa72d4c26753c1316df4521568e19

                SHA512

                ce91035f1f0041d085eb247fd250fb3a8e1de1c4dda9c6fa2bfc4ef84d00a47ea669af3fd1eabdd19bf2ec0a1419289bd0221dd58b87fba6b1934ed65393b876

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                06e3b166aa220481afbdefb57f2c10ef

                SHA1

                5f6bcbad753b210060a30ef90eaeaa9549082213

                SHA256

                0e0a6836c94d9b38954da8f1c73d151137daa72d4c26753c1316df4521568e19

                SHA512

                ce91035f1f0041d085eb247fd250fb3a8e1de1c4dda9c6fa2bfc4ef84d00a47ea669af3fd1eabdd19bf2ec0a1419289bd0221dd58b87fba6b1934ed65393b876

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                06e3b166aa220481afbdefb57f2c10ef

                SHA1

                5f6bcbad753b210060a30ef90eaeaa9549082213

                SHA256

                0e0a6836c94d9b38954da8f1c73d151137daa72d4c26753c1316df4521568e19

                SHA512

                ce91035f1f0041d085eb247fd250fb3a8e1de1c4dda9c6fa2bfc4ef84d00a47ea669af3fd1eabdd19bf2ec0a1419289bd0221dd58b87fba6b1934ed65393b876

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                06e3b166aa220481afbdefb57f2c10ef

                SHA1

                5f6bcbad753b210060a30ef90eaeaa9549082213

                SHA256

                0e0a6836c94d9b38954da8f1c73d151137daa72d4c26753c1316df4521568e19

                SHA512

                ce91035f1f0041d085eb247fd250fb3a8e1de1c4dda9c6fa2bfc4ef84d00a47ea669af3fd1eabdd19bf2ec0a1419289bd0221dd58b87fba6b1934ed65393b876

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                06e3b166aa220481afbdefb57f2c10ef

                SHA1

                5f6bcbad753b210060a30ef90eaeaa9549082213

                SHA256

                0e0a6836c94d9b38954da8f1c73d151137daa72d4c26753c1316df4521568e19

                SHA512

                ce91035f1f0041d085eb247fd250fb3a8e1de1c4dda9c6fa2bfc4ef84d00a47ea669af3fd1eabdd19bf2ec0a1419289bd0221dd58b87fba6b1934ed65393b876

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge574690.exe

                Filesize

                227KB

                MD5

                06e3b166aa220481afbdefb57f2c10ef

                SHA1

                5f6bcbad753b210060a30ef90eaeaa9549082213

                SHA256

                0e0a6836c94d9b38954da8f1c73d151137daa72d4c26753c1316df4521568e19

                SHA512

                ce91035f1f0041d085eb247fd250fb3a8e1de1c4dda9c6fa2bfc4ef84d00a47ea669af3fd1eabdd19bf2ec0a1419289bd0221dd58b87fba6b1934ed65393b876

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge574690.exe

                Filesize

                227KB

                MD5

                06e3b166aa220481afbdefb57f2c10ef

                SHA1

                5f6bcbad753b210060a30ef90eaeaa9549082213

                SHA256

                0e0a6836c94d9b38954da8f1c73d151137daa72d4c26753c1316df4521568e19

                SHA512

                ce91035f1f0041d085eb247fd250fb3a8e1de1c4dda9c6fa2bfc4ef84d00a47ea669af3fd1eabdd19bf2ec0a1419289bd0221dd58b87fba6b1934ed65393b876

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3195.exe

                Filesize

                822KB

                MD5

                31559f02bbe22c4eab6fb98fad8ecd04

                SHA1

                97322ac2fc32c3b009284bad7b89f84d8e217a2d

                SHA256

                7c0b1ee6beffcc2a22b48e9f74eb2d9852c84246f49843daecc48bd927a9e5e6

                SHA512

                16bc2aa20373df593f69cd645d212e074f47baaecdb55b2c37597a344b8797330d83d85c2f03c211c7a657bc951a9ade2bd4c42dc36cc64210709e147dfb0bfa

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3195.exe

                Filesize

                822KB

                MD5

                31559f02bbe22c4eab6fb98fad8ecd04

                SHA1

                97322ac2fc32c3b009284bad7b89f84d8e217a2d

                SHA256

                7c0b1ee6beffcc2a22b48e9f74eb2d9852c84246f49843daecc48bd927a9e5e6

                SHA512

                16bc2aa20373df593f69cd645d212e074f47baaecdb55b2c37597a344b8797330d83d85c2f03c211c7a657bc951a9ade2bd4c42dc36cc64210709e147dfb0bfa

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en570646.exe

                Filesize

                175KB

                MD5

                dfa3fadaa83bb9c1192e38a3f087a155

                SHA1

                d992dde4b8f35e306795a74a5108aed08c25a739

                SHA256

                114dbc83b61857e8f30d8ee2ca93a45b3ee10e3d558ae1f43b3a86b7f4c0b0ec

                SHA512

                47709c090b43eaca3614689bea10c8f30cfdc81019c85fc7d26e5582eec1063837b4645092b03e2aa5707594d1a11e10673c3902b87bdf4bc732d85f1a1594e2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en570646.exe

                Filesize

                175KB

                MD5

                dfa3fadaa83bb9c1192e38a3f087a155

                SHA1

                d992dde4b8f35e306795a74a5108aed08c25a739

                SHA256

                114dbc83b61857e8f30d8ee2ca93a45b3ee10e3d558ae1f43b3a86b7f4c0b0ec

                SHA512

                47709c090b43eaca3614689bea10c8f30cfdc81019c85fc7d26e5582eec1063837b4645092b03e2aa5707594d1a11e10673c3902b87bdf4bc732d85f1a1594e2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3820.exe

                Filesize

                680KB

                MD5

                ef425358ad7228e657410a46274cc79d

                SHA1

                eda49db4dc02b134a152a631a69035a2e7cdac34

                SHA256

                be39de3ca35f5465bb1e6837526a3b207a5c9a82982a7f1f3108851aecc9945e

                SHA512

                7449fb99fa5aa44af203748a718b7f139a571cb0e3b24a40aafa6d8f1e179d10502de65d35c4b1708f1a2c9eac6c32f34572dc426f528f77cb6a2fea055a9450

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3820.exe

                Filesize

                680KB

                MD5

                ef425358ad7228e657410a46274cc79d

                SHA1

                eda49db4dc02b134a152a631a69035a2e7cdac34

                SHA256

                be39de3ca35f5465bb1e6837526a3b207a5c9a82982a7f1f3108851aecc9945e

                SHA512

                7449fb99fa5aa44af203748a718b7f139a571cb0e3b24a40aafa6d8f1e179d10502de65d35c4b1708f1a2c9eac6c32f34572dc426f528f77cb6a2fea055a9450

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEA54s36.exe

                Filesize

                345KB

                MD5

                11ee39f5bf3dfc5f782661582a7e32e0

                SHA1

                67eaf3766dbb60cfd76aa2fbdbd85859dba3e8df

                SHA256

                b656a621d872fe013f2f04319b7de9c1210ea53b1ac41c9bfde3f1c06e335dc6

                SHA512

                8ea6fd8c466cbc733f3cff38fc9fc7af5436118feef01e476c5947fd6382fcbc94a29651c578036ebd28ebe4a6ac610cba35fbb61f00cadad9a3a3ceb11252ca

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEA54s36.exe

                Filesize

                345KB

                MD5

                11ee39f5bf3dfc5f782661582a7e32e0

                SHA1

                67eaf3766dbb60cfd76aa2fbdbd85859dba3e8df

                SHA256

                b656a621d872fe013f2f04319b7de9c1210ea53b1ac41c9bfde3f1c06e335dc6

                SHA512

                8ea6fd8c466cbc733f3cff38fc9fc7af5436118feef01e476c5947fd6382fcbc94a29651c578036ebd28ebe4a6ac610cba35fbb61f00cadad9a3a3ceb11252ca

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5158.exe

                Filesize

                345KB

                MD5

                9e918c2d9aebf821d55143bd0b21667f

                SHA1

                d030b803ff1b650354ddc3a5e5ca5024dd27b8e2

                SHA256

                2965c45e34b5904ad1e43e02f4ad1d6115e28c60afb5814044fdca6ccf8deadb

                SHA512

                7de8f972d6a0a24771a390103acd2b7c3e8a340e2bb2cfae8a2c10e1963a5a82637de70233903f341bc087371179ba1d2a03b6b4a4c675bc61fe603972ab6398

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5158.exe

                Filesize

                345KB

                MD5

                9e918c2d9aebf821d55143bd0b21667f

                SHA1

                d030b803ff1b650354ddc3a5e5ca5024dd27b8e2

                SHA256

                2965c45e34b5904ad1e43e02f4ad1d6115e28c60afb5814044fdca6ccf8deadb

                SHA512

                7de8f972d6a0a24771a390103acd2b7c3e8a340e2bb2cfae8a2c10e1963a5a82637de70233903f341bc087371179ba1d2a03b6b4a4c675bc61fe603972ab6398

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu455143.exe

                Filesize

                11KB

                MD5

                bbd440498315e029d0707a934d76cb98

                SHA1

                36503d21cccc67be0c8143f51d066f7c0d9ad3b0

                SHA256

                5256ce16ffd51bb8705484957104fd08108954094c1a63e96af68624a4ec23a3

                SHA512

                5d42afbcdcfa1ceab806af9a6547f9c1b880ba8ed8ef75d4abaa6c8523ca91018afc8d852ab6f4b63833db6d8edb2e48dae4bab12709140ddcd8fd3c978c3cd3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu455143.exe

                Filesize

                11KB

                MD5

                bbd440498315e029d0707a934d76cb98

                SHA1

                36503d21cccc67be0c8143f51d066f7c0d9ad3b0

                SHA256

                5256ce16ffd51bb8705484957104fd08108954094c1a63e96af68624a4ec23a3

                SHA512

                5d42afbcdcfa1ceab806af9a6547f9c1b880ba8ed8ef75d4abaa6c8523ca91018afc8d852ab6f4b63833db6d8edb2e48dae4bab12709140ddcd8fd3c978c3cd3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2289.exe

                Filesize

                291KB

                MD5

                76f7488546e2a9d4d1d6473a0a6420d5

                SHA1

                a7775fb32d9afdbb72001f016946936e7874a8fc

                SHA256

                b5ac6764c0e38a9ea9dad9330175453bd0d4d6cf1c1cef03c20ea5c92245f84a

                SHA512

                bc8f8b4838b523eda1ff163a8115d7fe41adfe84af5c570a5168bb538d6407b7019ac437f609a6414979e7fdca27a08fae10609eb13223aae56845433edf573e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2289.exe

                Filesize

                291KB

                MD5

                76f7488546e2a9d4d1d6473a0a6420d5

                SHA1

                a7775fb32d9afdbb72001f016946936e7874a8fc

                SHA256

                b5ac6764c0e38a9ea9dad9330175453bd0d4d6cf1c1cef03c20ea5c92245f84a

                SHA512

                bc8f8b4838b523eda1ff163a8115d7fe41adfe84af5c570a5168bb538d6407b7019ac437f609a6414979e7fdca27a08fae10609eb13223aae56845433edf573e

              • memory/2828-1115-0x00000000037E0000-0x00000000037F0000-memory.dmp

                Filesize

                64KB

              • memory/2828-1119-0x0000000007950000-0x00000000079A0000-memory.dmp

                Filesize

                320KB

              • memory/2828-1126-0x00000000037E0000-0x00000000037F0000-memory.dmp

                Filesize

                64KB

              • memory/2828-1125-0x0000000007CC0000-0x00000000081EC000-memory.dmp

                Filesize

                5.2MB

              • memory/2828-1124-0x0000000007AF0000-0x0000000007CB2000-memory.dmp

                Filesize

                1.8MB

              • memory/2828-1123-0x00000000037E0000-0x00000000037F0000-memory.dmp

                Filesize

                64KB

              • memory/2828-1122-0x00000000037E0000-0x00000000037F0000-memory.dmp

                Filesize

                64KB

              • memory/2828-1121-0x00000000037E0000-0x00000000037F0000-memory.dmp

                Filesize

                64KB

              • memory/2828-1118-0x00000000078B0000-0x0000000007926000-memory.dmp

                Filesize

                472KB

              • memory/2828-1117-0x0000000007810000-0x00000000078A2000-memory.dmp

                Filesize

                584KB

              • memory/2828-1116-0x0000000007150000-0x00000000071B6000-memory.dmp

                Filesize

                408KB

              • memory/2828-1114-0x0000000006FC0000-0x000000000700B000-memory.dmp

                Filesize

                300KB

              • memory/2828-1113-0x0000000006E70000-0x0000000006EAE000-memory.dmp

                Filesize

                248KB

              • memory/2828-1112-0x0000000006E50000-0x0000000006E62000-memory.dmp

                Filesize

                72KB

              • memory/2828-1111-0x0000000006D20000-0x0000000006E2A000-memory.dmp

                Filesize

                1.0MB

              • memory/2828-1110-0x0000000006710000-0x0000000006D16000-memory.dmp

                Filesize

                6.0MB

              • memory/2828-237-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-235-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-233-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-198-0x0000000003770000-0x00000000037B6000-memory.dmp

                Filesize

                280KB

              • memory/2828-199-0x0000000003960000-0x00000000039A4000-memory.dmp

                Filesize

                272KB

              • memory/2828-200-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-201-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-203-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-205-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-207-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-209-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-211-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-213-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-216-0x0000000001A30000-0x0000000001A7B000-memory.dmp

                Filesize

                300KB

              • memory/2828-215-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-219-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-220-0x00000000037E0000-0x00000000037F0000-memory.dmp

                Filesize

                64KB

              • memory/2828-218-0x00000000037E0000-0x00000000037F0000-memory.dmp

                Filesize

                64KB

              • memory/2828-222-0x00000000037E0000-0x00000000037F0000-memory.dmp

                Filesize

                64KB

              • memory/2828-223-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-225-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-227-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-229-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/2828-231-0x0000000003960000-0x000000000399F000-memory.dmp

                Filesize

                252KB

              • memory/3552-177-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-179-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-163-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-191-0x0000000004F40000-0x0000000004F50000-memory.dmp

                Filesize

                64KB

              • memory/3552-190-0x0000000004F40000-0x0000000004F50000-memory.dmp

                Filesize

                64KB

              • memory/3552-189-0x0000000004F40000-0x0000000004F50000-memory.dmp

                Filesize

                64KB

              • memory/3552-188-0x0000000000400000-0x000000000070B000-memory.dmp

                Filesize

                3.0MB

              • memory/3552-187-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-161-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-185-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-183-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-181-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-167-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-155-0x00000000026C0000-0x00000000026D8000-memory.dmp

                Filesize

                96KB

              • memory/3552-193-0x0000000000400000-0x000000000070B000-memory.dmp

                Filesize

                3.0MB

              • memory/3552-175-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-165-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-171-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-169-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-160-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-159-0x0000000004F40000-0x0000000004F50000-memory.dmp

                Filesize

                64KB

              • memory/3552-153-0x0000000002360000-0x000000000237A000-memory.dmp

                Filesize

                104KB

              • memory/3552-173-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/3552-154-0x0000000004F50000-0x000000000544E000-memory.dmp

                Filesize

                5.0MB

              • memory/3552-158-0x0000000004F40000-0x0000000004F50000-memory.dmp

                Filesize

                64KB

              • memory/3552-157-0x0000000004F40000-0x0000000004F50000-memory.dmp

                Filesize

                64KB

              • memory/3552-156-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/3760-1133-0x0000000004F30000-0x0000000004F7B000-memory.dmp

                Filesize

                300KB

              • memory/3760-1134-0x0000000004E10000-0x0000000004E20000-memory.dmp

                Filesize

                64KB

              • memory/3760-1132-0x00000000004F0000-0x0000000000522000-memory.dmp

                Filesize

                200KB

              • memory/4772-147-0x0000000000520000-0x000000000052A000-memory.dmp

                Filesize

                40KB