Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/03/2023, 21:52

General

  • Target

    b38c37f40576cce1857c15453d4fc0cd2f110b7d7e70e36038dfcc74ca99c0bd.exe

  • Size

    1.0MB

  • MD5

    8c55f2156316687ac262bcf51d1dd8f4

  • SHA1

    0b1969da1eebe1f9fdcfffebc4a75e4388194c2c

  • SHA256

    b38c37f40576cce1857c15453d4fc0cd2f110b7d7e70e36038dfcc74ca99c0bd

  • SHA512

    d02c140bcc1ee05f5cede5fdd36bd0223dac1b8f2dd8c9a775a141b6b2803247fc0b531066cdb1392cca44c46a786695d622dc43443dc6d45aad1eb4cb70efbd

  • SSDEEP

    24576:syzXKa3VbqLKYrPJQxHqwwgEdjQ0m57zX5fpvpbodtA2kFi:bzaQbuBrPCrwgbX5foGF

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

maxi

C2

193.233.20.30:4125

Attributes
  • auth_value

    6e90da232d4c2e35c1a36c250f5f8904

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b38c37f40576cce1857c15453d4fc0cd2f110b7d7e70e36038dfcc74ca99c0bd.exe
    "C:\Users\Admin\AppData\Local\Temp\b38c37f40576cce1857c15453d4fc0cd2f110b7d7e70e36038dfcc74ca99c0bd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino7936.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino7936.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino0031.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino0031.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4256
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino8380.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino8380.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3068
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5750.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5750.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4532
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5819.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5819.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3016
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyo99s19.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyo99s19.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en991951.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en991951.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge117935.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge117935.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3940
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4332
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4336
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5060
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:5084
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5044
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5076
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:5108
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:5116
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:1448

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge117935.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge117935.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino7936.exe

                Filesize

                850KB

                MD5

                f3ec50d09da7bc23aa2f806638830a18

                SHA1

                635330abf38933e3246ab9c36dbf2e3149232a11

                SHA256

                73460a66a72733f8ee83113490fb7912b4c6a246c957da057d2de28830659812

                SHA512

                23ae09d2ad9d795997a28bc6c40a964982a353c1f14b2256ebcebd4ce8c0daf8955101b05b6c00535114636d3ef0c91b2b7e6d2e9cb53c5e0eb79f3f5b944a89

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino7936.exe

                Filesize

                850KB

                MD5

                f3ec50d09da7bc23aa2f806638830a18

                SHA1

                635330abf38933e3246ab9c36dbf2e3149232a11

                SHA256

                73460a66a72733f8ee83113490fb7912b4c6a246c957da057d2de28830659812

                SHA512

                23ae09d2ad9d795997a28bc6c40a964982a353c1f14b2256ebcebd4ce8c0daf8955101b05b6c00535114636d3ef0c91b2b7e6d2e9cb53c5e0eb79f3f5b944a89

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en991951.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en991951.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino0031.exe

                Filesize

                708KB

                MD5

                73156a2511fc3349ee9a1f813dbad2e5

                SHA1

                4bf6fcb9891bc71dd964450ccea3fdc20145cb70

                SHA256

                021c2d82d4333a3e0e16052e8ab9a8b329e14acfb61e7752e5ff5f7f4860a616

                SHA512

                df7544915c5f97d8f1bf8072263e15586b4325a002731e1007d5a8621cc37e894a3b02a93a22a9b300bf296ed1dcdcd610eb306c02602a411b56e4ca24219e90

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino0031.exe

                Filesize

                708KB

                MD5

                73156a2511fc3349ee9a1f813dbad2e5

                SHA1

                4bf6fcb9891bc71dd964450ccea3fdc20145cb70

                SHA256

                021c2d82d4333a3e0e16052e8ab9a8b329e14acfb61e7752e5ff5f7f4860a616

                SHA512

                df7544915c5f97d8f1bf8072263e15586b4325a002731e1007d5a8621cc37e894a3b02a93a22a9b300bf296ed1dcdcd610eb306c02602a411b56e4ca24219e90

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyo99s19.exe

                Filesize

                497KB

                MD5

                43e5b11f4ec788c67aed2f4ab6db3735

                SHA1

                114be08f7ebbf0a6ae8c342545ad0de6427314d1

                SHA256

                5250e6040c65dd83d4cf701e685d20012642eee5a8ac74a7a130031eda090518

                SHA512

                31fd227c32e976dd5f475adea251af5573358a802a69066dee99b6c279277a22d1e7c6c67aa462f054650bb104e58a253db6023492d4589225626e0f7bdbb8d4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyo99s19.exe

                Filesize

                497KB

                MD5

                43e5b11f4ec788c67aed2f4ab6db3735

                SHA1

                114be08f7ebbf0a6ae8c342545ad0de6427314d1

                SHA256

                5250e6040c65dd83d4cf701e685d20012642eee5a8ac74a7a130031eda090518

                SHA512

                31fd227c32e976dd5f475adea251af5573358a802a69066dee99b6c279277a22d1e7c6c67aa462f054650bb104e58a253db6023492d4589225626e0f7bdbb8d4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino8380.exe

                Filesize

                351KB

                MD5

                810cb23dd0e2b736e2f12ea61bc56f86

                SHA1

                74b944af70dfc41733d5fdcde9b4ad3bba1df169

                SHA256

                c84936ce8486b7073daab771a32804a3af31d7b90965b625852046d81bd846ad

                SHA512

                afa30bf8b207375c1c6554a51fef1ec62ca2288cb2010cca7620aa941106d2fce02f3711a6e2569f5836223c2d26bcc5994d181a0d7a43a15255b7e2fa49ab20

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino8380.exe

                Filesize

                351KB

                MD5

                810cb23dd0e2b736e2f12ea61bc56f86

                SHA1

                74b944af70dfc41733d5fdcde9b4ad3bba1df169

                SHA256

                c84936ce8486b7073daab771a32804a3af31d7b90965b625852046d81bd846ad

                SHA512

                afa30bf8b207375c1c6554a51fef1ec62ca2288cb2010cca7620aa941106d2fce02f3711a6e2569f5836223c2d26bcc5994d181a0d7a43a15255b7e2fa49ab20

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5750.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5750.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5819.exe

                Filesize

                438KB

                MD5

                0321c967c62861ceb1812d148aa8f023

                SHA1

                5a79686ad56a0b1caa94a7961ceeb23f2d1342c1

                SHA256

                05136c2c3386f15bc29ce0590c6268b9c3d77830c9c981bd8324af1c634969ee

                SHA512

                eb745bb3d80255ccd8c0629ffaebd7175cb4cbc4dd0fcd57254e9450c5992ee98555ac3b8380e9ef29e2080aa842c45b509ec43086c7de9ec15df76c26649f6d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5819.exe

                Filesize

                438KB

                MD5

                0321c967c62861ceb1812d148aa8f023

                SHA1

                5a79686ad56a0b1caa94a7961ceeb23f2d1342c1

                SHA256

                05136c2c3386f15bc29ce0590c6268b9c3d77830c9c981bd8324af1c634969ee

                SHA512

                eb745bb3d80255ccd8c0629ffaebd7175cb4cbc4dd0fcd57254e9450c5992ee98555ac3b8380e9ef29e2080aa842c45b509ec43086c7de9ec15df76c26649f6d

              • memory/3016-167-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-188-0x0000000000400000-0x00000000004EE000-memory.dmp

                Filesize

                952KB

              • memory/3016-163-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-169-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-171-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-173-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-175-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-177-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-179-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-181-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-183-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-185-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-187-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-165-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-190-0x0000000000400000-0x00000000004EE000-memory.dmp

                Filesize

                952KB

              • memory/3016-155-0x0000000002280000-0x000000000229A000-memory.dmp

                Filesize

                104KB

              • memory/3016-161-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-160-0x00000000025E0000-0x00000000025F2000-memory.dmp

                Filesize

                72KB

              • memory/3016-159-0x00000000022C0000-0x00000000022D0000-memory.dmp

                Filesize

                64KB

              • memory/3016-158-0x00000000005C0000-0x00000000005ED000-memory.dmp

                Filesize

                180KB

              • memory/3016-157-0x00000000025E0000-0x00000000025F8000-memory.dmp

                Filesize

                96KB

              • memory/3016-156-0x0000000004A60000-0x0000000004F5E000-memory.dmp

                Filesize

                5.0MB

              • memory/4372-1131-0x0000000005570000-0x0000000005580000-memory.dmp

                Filesize

                64KB

              • memory/4372-1130-0x0000000005400000-0x000000000544B000-memory.dmp

                Filesize

                300KB

              • memory/4372-1129-0x00000000009C0000-0x00000000009F2000-memory.dmp

                Filesize

                200KB

              • memory/4532-149-0x0000000000290000-0x000000000029A000-memory.dmp

                Filesize

                40KB

              • memory/4804-206-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-209-0x0000000002280000-0x0000000002290000-memory.dmp

                Filesize

                64KB

              • memory/4804-212-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-214-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-216-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-218-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-220-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-222-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-224-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-226-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-228-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-230-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-232-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-234-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-1107-0x0000000005100000-0x0000000005706000-memory.dmp

                Filesize

                6.0MB

              • memory/4804-1108-0x0000000005710000-0x000000000581A000-memory.dmp

                Filesize

                1.0MB

              • memory/4804-1109-0x0000000002770000-0x0000000002782000-memory.dmp

                Filesize

                72KB

              • memory/4804-1110-0x0000000005820000-0x000000000585E000-memory.dmp

                Filesize

                248KB

              • memory/4804-1111-0x0000000005960000-0x00000000059AB000-memory.dmp

                Filesize

                300KB

              • memory/4804-1112-0x0000000002280000-0x0000000002290000-memory.dmp

                Filesize

                64KB

              • memory/4804-1114-0x0000000005AE0000-0x0000000005B72000-memory.dmp

                Filesize

                584KB

              • memory/4804-1115-0x0000000005B80000-0x0000000005BE6000-memory.dmp

                Filesize

                408KB

              • memory/4804-1117-0x0000000002280000-0x0000000002290000-memory.dmp

                Filesize

                64KB

              • memory/4804-1116-0x0000000002280000-0x0000000002290000-memory.dmp

                Filesize

                64KB

              • memory/4804-1118-0x0000000002280000-0x0000000002290000-memory.dmp

                Filesize

                64KB

              • memory/4804-1119-0x0000000007530000-0x00000000076F2000-memory.dmp

                Filesize

                1.8MB

              • memory/4804-1120-0x0000000007700000-0x0000000007C2C000-memory.dmp

                Filesize

                5.2MB

              • memory/4804-1121-0x0000000007DD0000-0x0000000007E46000-memory.dmp

                Filesize

                472KB

              • memory/4804-1122-0x0000000007E50000-0x0000000007EA0000-memory.dmp

                Filesize

                320KB

              • memory/4804-202-0x00000000005F0000-0x000000000063B000-memory.dmp

                Filesize

                300KB

              • memory/4804-204-0x0000000002280000-0x0000000002290000-memory.dmp

                Filesize

                64KB

              • memory/4804-210-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-207-0x0000000002280000-0x0000000002290000-memory.dmp

                Filesize

                64KB

              • memory/4804-203-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-200-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-198-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-197-0x0000000002530000-0x000000000256E000-memory.dmp

                Filesize

                248KB

              • memory/4804-196-0x0000000002530000-0x0000000002574000-memory.dmp

                Filesize

                272KB

              • memory/4804-195-0x0000000002220000-0x0000000002266000-memory.dmp

                Filesize

                280KB

              • memory/4804-1123-0x0000000002280000-0x0000000002290000-memory.dmp

                Filesize

                64KB