Analysis

  • max time kernel
    115s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2023, 15:01

General

  • Target

    920d8ccc9d8c8ab22e9fcd74eff578c8.exe

  • Size

    1.0MB

  • MD5

    920d8ccc9d8c8ab22e9fcd74eff578c8

  • SHA1

    413eff0ca643440290aebe40702b88f3f4317b9a

  • SHA256

    0729db707fb3dd1c2bdc628a51c32bc89202bd210e47f9f95034169316556423

  • SHA512

    500a8ac445d30fdf19185c67251fc25d99ac325958f504a59f12ec287e3b5ba46d99edbc47a28e38de9b45e603a7fa921e37f320f402d059e80f23df78045156

  • SSDEEP

    24576:RyUy/p+L042dtYgsBseV3tEJOTDrGvm+vBHsSYl2IfNL:EbnTdtaBs4tEUTDq++vBMAA

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

luza

C2

176.113.115.145:4125

Attributes
  • auth_value

    1261701914d508e02e8b4f25d38bc7f9

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\920d8ccc9d8c8ab22e9fcd74eff578c8.exe
    "C:\Users\Admin\AppData\Local\Temp\920d8ccc9d8c8ab22e9fcd74eff578c8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1217.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3039.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3039.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1188
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina4274.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina4274.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4168
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu043950.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu043950.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3628
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6971.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6971.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4928
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 1080
              6⤵
              • Program crash
              PID:2480
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRQ23s91.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRQ23s91.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4744
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 1676
            5⤵
            • Program crash
            PID:4888
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en750022.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en750022.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge412115.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge412115.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3832
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3636
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4124
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1112
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4708
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3644
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4936
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4948
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:808
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4928 -ip 4928
                1⤵
                  PID:532
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4744 -ip 4744
                  1⤵
                    PID:4792
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1640

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    228KB

                    MD5

                    cb3aa5fe6fd4f11748b02608ecc34b60

                    SHA1

                    51d1ee01f8708da80b3ad7ef8a26e2369af0ec76

                    SHA256

                    e3ae425e3f8c5f7144718c02caa3f923e075619218a52e36264dc1df1ade79b8

                    SHA512

                    6c109832b5f14c148bac1402c1325cb90f60c8b578c5659bd556b04dd9cef1fd526ff264e87c7e5c046101b19b4f8484801955d529a45336a1c7ff7d98c096ca

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    228KB

                    MD5

                    cb3aa5fe6fd4f11748b02608ecc34b60

                    SHA1

                    51d1ee01f8708da80b3ad7ef8a26e2369af0ec76

                    SHA256

                    e3ae425e3f8c5f7144718c02caa3f923e075619218a52e36264dc1df1ade79b8

                    SHA512

                    6c109832b5f14c148bac1402c1325cb90f60c8b578c5659bd556b04dd9cef1fd526ff264e87c7e5c046101b19b4f8484801955d529a45336a1c7ff7d98c096ca

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    228KB

                    MD5

                    cb3aa5fe6fd4f11748b02608ecc34b60

                    SHA1

                    51d1ee01f8708da80b3ad7ef8a26e2369af0ec76

                    SHA256

                    e3ae425e3f8c5f7144718c02caa3f923e075619218a52e36264dc1df1ade79b8

                    SHA512

                    6c109832b5f14c148bac1402c1325cb90f60c8b578c5659bd556b04dd9cef1fd526ff264e87c7e5c046101b19b4f8484801955d529a45336a1c7ff7d98c096ca

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    228KB

                    MD5

                    cb3aa5fe6fd4f11748b02608ecc34b60

                    SHA1

                    51d1ee01f8708da80b3ad7ef8a26e2369af0ec76

                    SHA256

                    e3ae425e3f8c5f7144718c02caa3f923e075619218a52e36264dc1df1ade79b8

                    SHA512

                    6c109832b5f14c148bac1402c1325cb90f60c8b578c5659bd556b04dd9cef1fd526ff264e87c7e5c046101b19b4f8484801955d529a45336a1c7ff7d98c096ca

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge412115.exe

                    Filesize

                    228KB

                    MD5

                    cb3aa5fe6fd4f11748b02608ecc34b60

                    SHA1

                    51d1ee01f8708da80b3ad7ef8a26e2369af0ec76

                    SHA256

                    e3ae425e3f8c5f7144718c02caa3f923e075619218a52e36264dc1df1ade79b8

                    SHA512

                    6c109832b5f14c148bac1402c1325cb90f60c8b578c5659bd556b04dd9cef1fd526ff264e87c7e5c046101b19b4f8484801955d529a45336a1c7ff7d98c096ca

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge412115.exe

                    Filesize

                    228KB

                    MD5

                    cb3aa5fe6fd4f11748b02608ecc34b60

                    SHA1

                    51d1ee01f8708da80b3ad7ef8a26e2369af0ec76

                    SHA256

                    e3ae425e3f8c5f7144718c02caa3f923e075619218a52e36264dc1df1ade79b8

                    SHA512

                    6c109832b5f14c148bac1402c1325cb90f60c8b578c5659bd556b04dd9cef1fd526ff264e87c7e5c046101b19b4f8484801955d529a45336a1c7ff7d98c096ca

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1217.exe

                    Filesize

                    871KB

                    MD5

                    bff013bfe980b536dfc302d191c30c9a

                    SHA1

                    8171cee0c1463800cd0639c6320f5d78c0b402ec

                    SHA256

                    60b64758732a4b20367539cdbff9ac08a9c4b43a302ad83006829f9af708b37b

                    SHA512

                    63b8fc2c0790142bfcbb7e7fffbf81699cc5cd33e492f23b9542b5ce3be19e8e673b57260620de5134d2a752ebed3fa4fca7cb8460a83f01f6676b0693668057

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina1217.exe

                    Filesize

                    871KB

                    MD5

                    bff013bfe980b536dfc302d191c30c9a

                    SHA1

                    8171cee0c1463800cd0639c6320f5d78c0b402ec

                    SHA256

                    60b64758732a4b20367539cdbff9ac08a9c4b43a302ad83006829f9af708b37b

                    SHA512

                    63b8fc2c0790142bfcbb7e7fffbf81699cc5cd33e492f23b9542b5ce3be19e8e673b57260620de5134d2a752ebed3fa4fca7cb8460a83f01f6676b0693668057

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en750022.exe

                    Filesize

                    175KB

                    MD5

                    8eee019a9d42ebf11cdacf958f22110f

                    SHA1

                    c8432f9823ffbf1a296861034018a41c41e945ff

                    SHA256

                    cc674d2aa93451126345649096c6eb961f682aa00d098d1a7ae48a2d3b526273

                    SHA512

                    21a459ae65655c1ae60e08cd1207ca5f554b33d93c3f71a67ef8faa7db74819d3233d3efdbc22b5ece25bf4cd90ae4ba912453054849b36c4f2d8853528f925f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en750022.exe

                    Filesize

                    175KB

                    MD5

                    8eee019a9d42ebf11cdacf958f22110f

                    SHA1

                    c8432f9823ffbf1a296861034018a41c41e945ff

                    SHA256

                    cc674d2aa93451126345649096c6eb961f682aa00d098d1a7ae48a2d3b526273

                    SHA512

                    21a459ae65655c1ae60e08cd1207ca5f554b33d93c3f71a67ef8faa7db74819d3233d3efdbc22b5ece25bf4cd90ae4ba912453054849b36c4f2d8853528f925f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3039.exe

                    Filesize

                    729KB

                    MD5

                    391b84b813867f56ff15dcaadb95f800

                    SHA1

                    d3be886b0e20361f41d2a8599fa2f95c0b551576

                    SHA256

                    9c4e3d096c160dfd1378810e1f41e1bdd11f62a5601a01287a75e19f964e1a3e

                    SHA512

                    da316760bb3e4ddbfbc5783afbcbbffd19fc2baefc1f7daa3afb58d553549003bbe2b7d969c885683214cb57e70797f6a489aac6a95be80b45f969e78b43cc23

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3039.exe

                    Filesize

                    729KB

                    MD5

                    391b84b813867f56ff15dcaadb95f800

                    SHA1

                    d3be886b0e20361f41d2a8599fa2f95c0b551576

                    SHA256

                    9c4e3d096c160dfd1378810e1f41e1bdd11f62a5601a01287a75e19f964e1a3e

                    SHA512

                    da316760bb3e4ddbfbc5783afbcbbffd19fc2baefc1f7daa3afb58d553549003bbe2b7d969c885683214cb57e70797f6a489aac6a95be80b45f969e78b43cc23

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRQ23s91.exe

                    Filesize

                    405KB

                    MD5

                    36364f7806aa87f35442d203124d9cef

                    SHA1

                    f159d86e08a01cfdd9e57915a7f8e5ef4c93a62d

                    SHA256

                    445d124bd205f6859fd7ff4d8fc83b555d387422afca22036bcec70e977562a5

                    SHA512

                    9417e0686e9e7ef296af91b2407cfdd974792a360eb6fbdeb336c9c66018957e6c89c0fe203cb324a5432a16b0d37a10d50dc713477101f0fceb7838b5764e48

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRQ23s91.exe

                    Filesize

                    405KB

                    MD5

                    36364f7806aa87f35442d203124d9cef

                    SHA1

                    f159d86e08a01cfdd9e57915a7f8e5ef4c93a62d

                    SHA256

                    445d124bd205f6859fd7ff4d8fc83b555d387422afca22036bcec70e977562a5

                    SHA512

                    9417e0686e9e7ef296af91b2407cfdd974792a360eb6fbdeb336c9c66018957e6c89c0fe203cb324a5432a16b0d37a10d50dc713477101f0fceb7838b5764e48

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina4274.exe

                    Filesize

                    361KB

                    MD5

                    7edc8e43168589c877a11a776338b7b6

                    SHA1

                    5b3b6bd60d0a2648b15a2ab84bfac17672cfc1b2

                    SHA256

                    670032cba19410d05f6ead23024e09c6ba03ad74158035ad56d21f77e2bb9fdc

                    SHA512

                    461e873c8aa58e5423efedf95f311c353bf810adbb38cbef1d56b0e3f47bd59fd56d73561437a2137ab56f4fff1f03bc1a81a54a210560769a4320d1a3b05826

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina4274.exe

                    Filesize

                    361KB

                    MD5

                    7edc8e43168589c877a11a776338b7b6

                    SHA1

                    5b3b6bd60d0a2648b15a2ab84bfac17672cfc1b2

                    SHA256

                    670032cba19410d05f6ead23024e09c6ba03ad74158035ad56d21f77e2bb9fdc

                    SHA512

                    461e873c8aa58e5423efedf95f311c353bf810adbb38cbef1d56b0e3f47bd59fd56d73561437a2137ab56f4fff1f03bc1a81a54a210560769a4320d1a3b05826

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu043950.exe

                    Filesize

                    11KB

                    MD5

                    2d9818d5f12b57309b5b4dccc23f5af0

                    SHA1

                    c9d976335bf43ce2b64c4dc938053b0920209c45

                    SHA256

                    28e01dedce1f1e61271b8c02daba44d2cf8b7f9006027e6cc0476e832420f04c

                    SHA512

                    78ca691563f8d1f5578ffaf324ed26366ec9bd4185ec7d1c190d140eff8d628e3228921ecc5caf9131ed3f518076b6d202f1cfbe96dd75923d7688c68f8e363c

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu043950.exe

                    Filesize

                    11KB

                    MD5

                    2d9818d5f12b57309b5b4dccc23f5af0

                    SHA1

                    c9d976335bf43ce2b64c4dc938053b0920209c45

                    SHA256

                    28e01dedce1f1e61271b8c02daba44d2cf8b7f9006027e6cc0476e832420f04c

                    SHA512

                    78ca691563f8d1f5578ffaf324ed26366ec9bd4185ec7d1c190d140eff8d628e3228921ecc5caf9131ed3f518076b6d202f1cfbe96dd75923d7688c68f8e363c

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6971.exe

                    Filesize

                    347KB

                    MD5

                    c6e6df2857dbd6c40dc689b6508acc76

                    SHA1

                    6d2e64004a943e40b33b175dad70c938cb1d371f

                    SHA256

                    934a2aa7b94716fb72df8dd2e56bec7150bacf12d2055db3f5bb2a6a6a4c2caf

                    SHA512

                    5dc5b07b4b5cc4d3cfbe1a32e225ce174e903a6ea641561b8cc5f9fc1dad722ec6fe1d26f234715c675b65de3c6d9986eb1b6b99fba2042b8be2dc59a6b3f9ce

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6971.exe

                    Filesize

                    347KB

                    MD5

                    c6e6df2857dbd6c40dc689b6508acc76

                    SHA1

                    6d2e64004a943e40b33b175dad70c938cb1d371f

                    SHA256

                    934a2aa7b94716fb72df8dd2e56bec7150bacf12d2055db3f5bb2a6a6a4c2caf

                    SHA512

                    5dc5b07b4b5cc4d3cfbe1a32e225ce174e903a6ea641561b8cc5f9fc1dad722ec6fe1d26f234715c675b65de3c6d9986eb1b6b99fba2042b8be2dc59a6b3f9ce

                  • memory/428-1142-0x0000000005810000-0x0000000005820000-memory.dmp

                    Filesize

                    64KB

                  • memory/428-1141-0x0000000000F10000-0x0000000000F42000-memory.dmp

                    Filesize

                    200KB

                  • memory/3628-161-0x0000000000340000-0x000000000034A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4744-1123-0x00000000080E0000-0x000000000811C000-memory.dmp

                    Filesize

                    240KB

                  • memory/4744-237-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-1135-0x0000000004C30000-0x0000000004C40000-memory.dmp

                    Filesize

                    64KB

                  • memory/4744-1134-0x00000000090A0000-0x00000000095CC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/4744-1133-0x0000000008EC0000-0x0000000009082000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/4744-1132-0x0000000008E60000-0x0000000008EB0000-memory.dmp

                    Filesize

                    320KB

                  • memory/4744-1131-0x0000000008DD0000-0x0000000008E46000-memory.dmp

                    Filesize

                    472KB

                  • memory/4744-1130-0x0000000004C30000-0x0000000004C40000-memory.dmp

                    Filesize

                    64KB

                  • memory/4744-1129-0x0000000004C30000-0x0000000004C40000-memory.dmp

                    Filesize

                    64KB

                  • memory/4744-1128-0x0000000004C30000-0x0000000004C40000-memory.dmp

                    Filesize

                    64KB

                  • memory/4744-1127-0x0000000008470000-0x00000000084D6000-memory.dmp

                    Filesize

                    408KB

                  • memory/4744-1126-0x00000000083D0000-0x0000000008462000-memory.dmp

                    Filesize

                    584KB

                  • memory/4744-1124-0x0000000004C30000-0x0000000004C40000-memory.dmp

                    Filesize

                    64KB

                  • memory/4744-1122-0x00000000080C0000-0x00000000080D2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4744-1121-0x0000000007F80000-0x000000000808A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/4744-210-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-211-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-213-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-215-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-218-0x0000000002CB0000-0x0000000002CFB000-memory.dmp

                    Filesize

                    300KB

                  • memory/4744-220-0x0000000004C30000-0x0000000004C40000-memory.dmp

                    Filesize

                    64KB

                  • memory/4744-217-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-222-0x0000000004C30000-0x0000000004C40000-memory.dmp

                    Filesize

                    64KB

                  • memory/4744-221-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-225-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-223-0x0000000004C30000-0x0000000004C40000-memory.dmp

                    Filesize

                    64KB

                  • memory/4744-227-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-229-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-231-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-233-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-235-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-1120-0x00000000078E0000-0x0000000007EF8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/4744-239-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-241-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-243-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-245-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4744-247-0x0000000004BE0000-0x0000000004C1F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4928-196-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-170-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-188-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-184-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-205-0x0000000000400000-0x0000000002B84000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/4928-203-0x0000000007370000-0x0000000007380000-memory.dmp

                    Filesize

                    64KB

                  • memory/4928-202-0x0000000007370000-0x0000000007380000-memory.dmp

                    Filesize

                    64KB

                  • memory/4928-201-0x0000000007370000-0x0000000007380000-memory.dmp

                    Filesize

                    64KB

                  • memory/4928-200-0x0000000000400000-0x0000000002B84000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/4928-199-0x0000000007370000-0x0000000007380000-memory.dmp

                    Filesize

                    64KB

                  • memory/4928-198-0x0000000007370000-0x0000000007380000-memory.dmp

                    Filesize

                    64KB

                  • memory/4928-197-0x0000000007370000-0x0000000007380000-memory.dmp

                    Filesize

                    64KB

                  • memory/4928-186-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-192-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-190-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-182-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-180-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-178-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-176-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-174-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-172-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-194-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-169-0x0000000004A50000-0x0000000004A62000-memory.dmp

                    Filesize

                    72KB

                  • memory/4928-168-0x0000000007380000-0x0000000007924000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4928-167-0x0000000002C60000-0x0000000002C8D000-memory.dmp

                    Filesize

                    180KB