Analysis

  • max time kernel
    114s
  • max time network
    140s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/03/2023, 04:38

General

  • Target

    e742a96f0046851d85ff78c6197c97526950ee983efd58a214c6cf8cc645b9fb.exe

  • Size

    1.1MB

  • MD5

    b9377e751e52ce52d7e83c9c6c2ce2c0

  • SHA1

    95108ae043f232e3400a2a9ab7b8b52328e779a6

  • SHA256

    e742a96f0046851d85ff78c6197c97526950ee983efd58a214c6cf8cc645b9fb

  • SHA512

    47989864307d140e1e7a97587c3e205d0fd970d09533a7e84684efcd0e2260dfd441d35f4f56447dc504caa03b7c1799389e48477f88c871bafc27a5b550137a

  • SSDEEP

    24576:E4AcEx/hs3r6vdtJSqWH842B+q0MjUTFnhIRsEMTXPUOsEnmA1Ku:EpZxJsbyRSUfB+qaORsNPxnmKK

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e742a96f0046851d85ff78c6197c97526950ee983efd58a214c6cf8cc645b9fb.exe
    "C:\Users\Admin\AppData\Local\Temp\e742a96f0046851d85ff78c6197c97526950ee983efd58a214c6cf8cc645b9fb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2961.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2961.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7837.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7837.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1003.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1003.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2382.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2382.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2992
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8115.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8115.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4416
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dia45s07.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dia45s07.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en466748.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en466748.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge461231.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge461231.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3412
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3332
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4400
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5108
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5096
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4404
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5004
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:820
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:868
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:816
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:600
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:496

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge461231.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge461231.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2961.exe

                Filesize

                778KB

                MD5

                9a4604feba7e8a9eabd59358fa932da6

                SHA1

                821afa270a8b71e27d18d48e7a517e82c2941a9b

                SHA256

                509e4fe5905d63c7c243040699b8a28bacc1b0b81a6ce8417ce0178399f3be14

                SHA512

                21bb7d3b414af143ac60d8db5009fa9b82aba6899c83530b3cdbec83b912a2a9446ee5cac86a6ea55e2307ac7ed044c6953143613047b22b49842ea7e02f8a20

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2961.exe

                Filesize

                778KB

                MD5

                9a4604feba7e8a9eabd59358fa932da6

                SHA1

                821afa270a8b71e27d18d48e7a517e82c2941a9b

                SHA256

                509e4fe5905d63c7c243040699b8a28bacc1b0b81a6ce8417ce0178399f3be14

                SHA512

                21bb7d3b414af143ac60d8db5009fa9b82aba6899c83530b3cdbec83b912a2a9446ee5cac86a6ea55e2307ac7ed044c6953143613047b22b49842ea7e02f8a20

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en466748.exe

                Filesize

                175KB

                MD5

                6fbff2d7c9ba7f0a71f02a5c70df9dfc

                SHA1

                003da0075734cd2d7f201c5b0e4779b8e1f33621

                SHA256

                cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

                SHA512

                25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en466748.exe

                Filesize

                175KB

                MD5

                6fbff2d7c9ba7f0a71f02a5c70df9dfc

                SHA1

                003da0075734cd2d7f201c5b0e4779b8e1f33621

                SHA256

                cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

                SHA512

                25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7837.exe

                Filesize

                636KB

                MD5

                fb8d2a2ac7b5d893c062d9b9e51080d9

                SHA1

                37b3ee7c73d4750f0065fac1fe36d0f4437df16e

                SHA256

                a36749f061bded19a3c838092f9f1461a398b0ef5e82c78da76870d03b33d993

                SHA512

                6c64455c4f052eb8873e703719888c32738fe37e63b4278e25958481ace6d3a8519b899a7cc02063137e8b8c02f42041a55b64552a1b224d75bc3fd05a38d55b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7837.exe

                Filesize

                636KB

                MD5

                fb8d2a2ac7b5d893c062d9b9e51080d9

                SHA1

                37b3ee7c73d4750f0065fac1fe36d0f4437df16e

                SHA256

                a36749f061bded19a3c838092f9f1461a398b0ef5e82c78da76870d03b33d993

                SHA512

                6c64455c4f052eb8873e703719888c32738fe37e63b4278e25958481ace6d3a8519b899a7cc02063137e8b8c02f42041a55b64552a1b224d75bc3fd05a38d55b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dia45s07.exe

                Filesize

                290KB

                MD5

                6a8d58a1a948235ce781d5def7afacea

                SHA1

                38543516a654699dbf5464695c9e774143f5c06d

                SHA256

                67996cf39e94279409ebf864ac1fbf164f1d6ff0732a9d2bc34fd4714fcf8ca3

                SHA512

                63243c1c0030dc89eebed55bb9ca35a032f0ae62f40cb7bc6220e6207f325731ea57f48520849562da70b5d33d7b2ef90d1b5aa06b4e022a7148834f59ebca25

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dia45s07.exe

                Filesize

                290KB

                MD5

                6a8d58a1a948235ce781d5def7afacea

                SHA1

                38543516a654699dbf5464695c9e774143f5c06d

                SHA256

                67996cf39e94279409ebf864ac1fbf164f1d6ff0732a9d2bc34fd4714fcf8ca3

                SHA512

                63243c1c0030dc89eebed55bb9ca35a032f0ae62f40cb7bc6220e6207f325731ea57f48520849562da70b5d33d7b2ef90d1b5aa06b4e022a7148834f59ebca25

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1003.exe

                Filesize

                315KB

                MD5

                6baf38d8127e0c1a14d4575cad960370

                SHA1

                5fd86e762a266ac964c7152ee8ca17a7f72a937b

                SHA256

                74a68c02fbfe93a392797fe0b1479c4c6aade6dfcbab93977faffc86a315b06c

                SHA512

                c85ceca7fb76bb496a8779b588c7a0bfc6e74c615faaf26fdea1937a9837ba421b9087d2d8313087d65dcbae0ae1ede97d755d8fc169a4880d49ec7407dff41b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1003.exe

                Filesize

                315KB

                MD5

                6baf38d8127e0c1a14d4575cad960370

                SHA1

                5fd86e762a266ac964c7152ee8ca17a7f72a937b

                SHA256

                74a68c02fbfe93a392797fe0b1479c4c6aade6dfcbab93977faffc86a315b06c

                SHA512

                c85ceca7fb76bb496a8779b588c7a0bfc6e74c615faaf26fdea1937a9837ba421b9087d2d8313087d65dcbae0ae1ede97d755d8fc169a4880d49ec7407dff41b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2382.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2382.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8115.exe

                Filesize

                232KB

                MD5

                8bfe45fccb902c3c96ed90dfdd6002a2

                SHA1

                e6cf4f51e3ba088af5c35ec0395d0d92e0020e80

                SHA256

                77b4a8914172119e786732b0dd1c7d3dfa2be458f99db28e007ee95a4bad6db6

                SHA512

                c85a5c15dec5adf72f96f603c3711ed03c84ab4bfb8a8ac27f4a16791a456951b5a586b6b43002ad8c779414db7807f4244ae7b5057258cdb7312066d095d1ee

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8115.exe

                Filesize

                232KB

                MD5

                8bfe45fccb902c3c96ed90dfdd6002a2

                SHA1

                e6cf4f51e3ba088af5c35ec0395d0d92e0020e80

                SHA256

                77b4a8914172119e786732b0dd1c7d3dfa2be458f99db28e007ee95a4bad6db6

                SHA512

                c85a5c15dec5adf72f96f603c3711ed03c84ab4bfb8a8ac27f4a16791a456951b5a586b6b43002ad8c779414db7807f4244ae7b5057258cdb7312066d095d1ee

              • memory/2992-151-0x0000000000550000-0x000000000055A000-memory.dmp

                Filesize

                40KB

              • memory/4128-1139-0x00000000050F0000-0x0000000005100000-memory.dmp

                Filesize

                64KB

              • memory/4128-1138-0x0000000005220000-0x000000000526B000-memory.dmp

                Filesize

                300KB

              • memory/4128-1137-0x00000000007E0000-0x0000000000812000-memory.dmp

                Filesize

                200KB

              • memory/4416-172-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-198-0x0000000000400000-0x00000000004BB000-memory.dmp

                Filesize

                748KB

              • memory/4416-178-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-180-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-182-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-184-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-186-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-188-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-190-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-192-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-194-0x0000000000400000-0x00000000004BB000-memory.dmp

                Filesize

                748KB

              • memory/4416-195-0x0000000004B20000-0x0000000004B30000-memory.dmp

                Filesize

                64KB

              • memory/4416-196-0x0000000004B20000-0x0000000004B30000-memory.dmp

                Filesize

                64KB

              • memory/4416-176-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-174-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-170-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-168-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-166-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-165-0x00000000022F0000-0x0000000002302000-memory.dmp

                Filesize

                72KB

              • memory/4416-162-0x0000000004B20000-0x0000000004B30000-memory.dmp

                Filesize

                64KB

              • memory/4416-163-0x0000000004B20000-0x0000000004B30000-memory.dmp

                Filesize

                64KB

              • memory/4416-164-0x0000000004B20000-0x0000000004B30000-memory.dmp

                Filesize

                64KB

              • memory/4416-160-0x00000000004C0000-0x00000000004ED000-memory.dmp

                Filesize

                180KB

              • memory/4416-161-0x00000000022F0000-0x0000000002308000-memory.dmp

                Filesize

                96KB

              • memory/4416-159-0x0000000004B30000-0x000000000502E000-memory.dmp

                Filesize

                5.0MB

              • memory/4416-158-0x0000000002150000-0x000000000216A000-memory.dmp

                Filesize

                104KB

              • memory/4520-206-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-225-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-227-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-229-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-231-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-233-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-235-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-237-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-512-0x0000000004B70000-0x0000000004B80000-memory.dmp

                Filesize

                64KB

              • memory/4520-516-0x0000000004B70000-0x0000000004B80000-memory.dmp

                Filesize

                64KB

              • memory/4520-513-0x0000000004B70000-0x0000000004B80000-memory.dmp

                Filesize

                64KB

              • memory/4520-1115-0x0000000005080000-0x0000000005686000-memory.dmp

                Filesize

                6.0MB

              • memory/4520-1116-0x0000000005690000-0x000000000579A000-memory.dmp

                Filesize

                1.0MB

              • memory/4520-1117-0x00000000057B0000-0x00000000057C2000-memory.dmp

                Filesize

                72KB

              • memory/4520-1118-0x00000000057D0000-0x000000000580E000-memory.dmp

                Filesize

                248KB

              • memory/4520-1119-0x0000000005920000-0x000000000596B000-memory.dmp

                Filesize

                300KB

              • memory/4520-1121-0x0000000005AB0000-0x0000000005B42000-memory.dmp

                Filesize

                584KB

              • memory/4520-1122-0x0000000005B50000-0x0000000005BB6000-memory.dmp

                Filesize

                408KB

              • memory/4520-1124-0x0000000004B70000-0x0000000004B80000-memory.dmp

                Filesize

                64KB

              • memory/4520-1125-0x0000000004B70000-0x0000000004B80000-memory.dmp

                Filesize

                64KB

              • memory/4520-1126-0x0000000004B70000-0x0000000004B80000-memory.dmp

                Filesize

                64KB

              • memory/4520-1127-0x0000000006490000-0x0000000006652000-memory.dmp

                Filesize

                1.8MB

              • memory/4520-1128-0x0000000004B70000-0x0000000004B80000-memory.dmp

                Filesize

                64KB

              • memory/4520-1129-0x0000000006680000-0x0000000006BAC000-memory.dmp

                Filesize

                5.2MB

              • memory/4520-1130-0x0000000006CF0000-0x0000000006D66000-memory.dmp

                Filesize

                472KB

              • memory/4520-1131-0x0000000006D70000-0x0000000006DC0000-memory.dmp

                Filesize

                320KB

              • memory/4520-223-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-221-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-219-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-217-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-215-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-213-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-211-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-209-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-207-0x00000000025E0000-0x000000000261E000-memory.dmp

                Filesize

                248KB

              • memory/4520-205-0x00000000025E0000-0x0000000002624000-memory.dmp

                Filesize

                272KB

              • memory/4520-203-0x00000000006F0000-0x000000000073B000-memory.dmp

                Filesize

                300KB

              • memory/4520-204-0x00000000020B0000-0x00000000020F6000-memory.dmp

                Filesize

                280KB

              • memory/4600-126-0x0000000004760000-0x000000000484C000-memory.dmp

                Filesize

                944KB

              • memory/4600-152-0x0000000000400000-0x00000000008F6000-memory.dmp

                Filesize

                5.0MB