Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/03/2023, 18:46

General

  • Target

    31dd4389620466270f338653f2b8ead4e96358cee565d418ec37e5c0f24fb05e.exe

  • Size

    1011KB

  • MD5

    7d9deeb65a4a188bd618dfd3bf3a869c

  • SHA1

    4c606168a3f65e4ee920e1feb6b2ca5cc9475d39

  • SHA256

    31dd4389620466270f338653f2b8ead4e96358cee565d418ec37e5c0f24fb05e

  • SHA512

    ee81fb94a192fb4cae8452f5faf94102623c0211ea4712042e93d4e7dec0dbbfbe87ce94c3579459fa1de95deb7ab962997a36b9677b0bd9da5613f07ea3df94

  • SSDEEP

    12288:VMrty90Ty7miIf7GQzdB0rTFgUrLTQIivDaz1bU77F4BktIfjIYG/ueP:kyKyq/jGYeFgUX07La5U77FYkteIVP

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

maxi

C2

193.233.20.30:4125

Attributes
  • auth_value

    6e90da232d4c2e35c1a36c250f5f8904

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 23 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31dd4389620466270f338653f2b8ead4e96358cee565d418ec37e5c0f24fb05e.exe
    "C:\Users\Admin\AppData\Local\Temp\31dd4389620466270f338653f2b8ead4e96358cee565d418ec37e5c0f24fb05e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6676.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6676.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2169.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2169.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3960
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0013.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0013.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5100
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2123.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2123.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2144
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7801.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7801.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4740
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRx94s32.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRx94s32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en274909.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en274909.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge371929.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge371929.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4400
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:692
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3840
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3484
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1704
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:1660
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:1712
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\5975271bda" /P "Admin:N"
                  5⤵
                    PID:4320
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    5⤵
                      PID:3972
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4428
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4260
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:648

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge371929.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge371929.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6676.exe

                Filesize

                829KB

                MD5

                5610b045621b778dc44046329a85d8d2

                SHA1

                b712022805606eedfbc2ccce108d1703024ca8d7

                SHA256

                cba88dc55e4badd75b24afb8d1575fec0a7a5588e412d9b628748559ecb164d2

                SHA512

                d65a89d660712269e54081f8fd59bb7d4313c83e59fb803aa33112ccd8bc615e2f7ed098684edf3faca28477872162513ffd5192b86412e556a97eacc3728752

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6676.exe

                Filesize

                829KB

                MD5

                5610b045621b778dc44046329a85d8d2

                SHA1

                b712022805606eedfbc2ccce108d1703024ca8d7

                SHA256

                cba88dc55e4badd75b24afb8d1575fec0a7a5588e412d9b628748559ecb164d2

                SHA512

                d65a89d660712269e54081f8fd59bb7d4313c83e59fb803aa33112ccd8bc615e2f7ed098684edf3faca28477872162513ffd5192b86412e556a97eacc3728752

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en274909.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en274909.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2169.exe

                Filesize

                687KB

                MD5

                2cf3e64cec7c2a3ae1edceb81d6f5771

                SHA1

                7b37241bed8a75b01e79adbe40605c2c32efc9ab

                SHA256

                ba572091bbab4cce2e2054d9645603efa56971f93669c860cf7b49b257b6f966

                SHA512

                310b59c330cd57429cba9c43414df70849e79305250762c9737f1f1ea0b7aaab02a02f73062497d13305ce5df156da59b8f17e77023cbe6313ba1f000245f0c5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2169.exe

                Filesize

                687KB

                MD5

                2cf3e64cec7c2a3ae1edceb81d6f5771

                SHA1

                7b37241bed8a75b01e79adbe40605c2c32efc9ab

                SHA256

                ba572091bbab4cce2e2054d9645603efa56971f93669c860cf7b49b257b6f966

                SHA512

                310b59c330cd57429cba9c43414df70849e79305250762c9737f1f1ea0b7aaab02a02f73062497d13305ce5df156da59b8f17e77023cbe6313ba1f000245f0c5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRx94s32.exe

                Filesize

                473KB

                MD5

                3fc468b342b5ca7757474bf04512a0ec

                SHA1

                fd926ed18139f85a5bd5f79d1376cda62ed7bd6e

                SHA256

                4e88915679dd6007a89edbe67601444c94c554737c81ef11cdd3b98f9336b8ba

                SHA512

                43a7f888cf3619d11696e177efbaa2e94891af066682af506f5ad352dfcadb8126249828f332c2e00cb3f05d23dc07487e69088320920ad650d2cbe0fcdc149e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRx94s32.exe

                Filesize

                473KB

                MD5

                3fc468b342b5ca7757474bf04512a0ec

                SHA1

                fd926ed18139f85a5bd5f79d1376cda62ed7bd6e

                SHA256

                4e88915679dd6007a89edbe67601444c94c554737c81ef11cdd3b98f9336b8ba

                SHA512

                43a7f888cf3619d11696e177efbaa2e94891af066682af506f5ad352dfcadb8126249828f332c2e00cb3f05d23dc07487e69088320920ad650d2cbe0fcdc149e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0013.exe

                Filesize

                340KB

                MD5

                fed59ce3ac1645af8a9d11e9257e60d0

                SHA1

                da88913f89f9b5b59a6cfbafe992eb28b5fd2750

                SHA256

                2d92934ac66b009b51cdc7a6ffdeef7ee10a06c6c9ef5c41610eb845a727be8c

                SHA512

                6de9b694dec324069490b3264d261bf2ef9795e3d416077d3a773e652b52f64a0d926e3bae64625cbd48839dec0d26599ef77db51917ae92492b8a7af195c779

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0013.exe

                Filesize

                340KB

                MD5

                fed59ce3ac1645af8a9d11e9257e60d0

                SHA1

                da88913f89f9b5b59a6cfbafe992eb28b5fd2750

                SHA256

                2d92934ac66b009b51cdc7a6ffdeef7ee10a06c6c9ef5c41610eb845a727be8c

                SHA512

                6de9b694dec324069490b3264d261bf2ef9795e3d416077d3a773e652b52f64a0d926e3bae64625cbd48839dec0d26599ef77db51917ae92492b8a7af195c779

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2123.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2123.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7801.exe

                Filesize

                415KB

                MD5

                a70c22c4564059c2c13ad41d627eb925

                SHA1

                d65e99c9c7420e634a22c2135f6d49d528434f37

                SHA256

                067d29e04bd100ee9572e68b128de96f073b6b0a86cdb832c1508299f2002962

                SHA512

                265291b93dff30fc8c0a1b9fb8593398f5435ce9edcb9c270b31253a1c2ab831abf7f45057f38060b55f3956e77091cffa2c7af8538c5d325d28d59487c2fa73

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7801.exe

                Filesize

                415KB

                MD5

                a70c22c4564059c2c13ad41d627eb925

                SHA1

                d65e99c9c7420e634a22c2135f6d49d528434f37

                SHA256

                067d29e04bd100ee9572e68b128de96f073b6b0a86cdb832c1508299f2002962

                SHA512

                265291b93dff30fc8c0a1b9fb8593398f5435ce9edcb9c270b31253a1c2ab831abf7f45057f38060b55f3956e77091cffa2c7af8538c5d325d28d59487c2fa73

              • memory/2144-148-0x0000000000DC0000-0x0000000000DCA000-memory.dmp

                Filesize

                40KB

              • memory/2956-1116-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/2956-230-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-1127-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/2956-1126-0x0000000006650000-0x0000000006B7C000-memory.dmp

                Filesize

                5.2MB

              • memory/2956-1125-0x0000000006480000-0x0000000006642000-memory.dmp

                Filesize

                1.8MB

              • memory/2956-1124-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/2956-1123-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/2956-1122-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/2956-1121-0x00000000062F0000-0x0000000006340000-memory.dmp

                Filesize

                320KB

              • memory/2956-1120-0x0000000006270000-0x00000000062E6000-memory.dmp

                Filesize

                472KB

              • memory/2956-1118-0x00000000061D0000-0x0000000006262000-memory.dmp

                Filesize

                584KB

              • memory/2956-1117-0x0000000005AE0000-0x0000000005B46000-memory.dmp

                Filesize

                408KB

              • memory/2956-1115-0x0000000005950000-0x000000000599B000-memory.dmp

                Filesize

                300KB

              • memory/2956-1114-0x0000000005800000-0x000000000583E000-memory.dmp

                Filesize

                248KB

              • memory/2956-1113-0x00000000057E0000-0x00000000057F2000-memory.dmp

                Filesize

                72KB

              • memory/2956-1112-0x00000000056A0000-0x00000000057AA000-memory.dmp

                Filesize

                1.0MB

              • memory/2956-1111-0x0000000005010000-0x0000000005616000-memory.dmp

                Filesize

                6.0MB

              • memory/2956-342-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/2956-199-0x0000000004A30000-0x0000000004A76000-memory.dmp

                Filesize

                280KB

              • memory/2956-200-0x0000000004FC0000-0x0000000005004000-memory.dmp

                Filesize

                272KB

              • memory/2956-201-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-202-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-204-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-206-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-208-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-210-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-212-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-214-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-216-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-218-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-220-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-222-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-224-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-226-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-228-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-340-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/2956-232-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-234-0x0000000004FC0000-0x0000000004FFE000-memory.dmp

                Filesize

                248KB

              • memory/2956-337-0x0000000000600000-0x000000000064B000-memory.dmp

                Filesize

                300KB

              • memory/2956-338-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/4424-1133-0x0000000000930000-0x0000000000962000-memory.dmp

                Filesize

                200KB

              • memory/4424-1135-0x0000000005200000-0x0000000005210000-memory.dmp

                Filesize

                64KB

              • memory/4424-1134-0x00000000051B0000-0x00000000051FB000-memory.dmp

                Filesize

                300KB

              • memory/4740-164-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-174-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-191-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/4740-190-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/4740-170-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-189-0x0000000000400000-0x00000000004E8000-memory.dmp

                Filesize

                928KB

              • memory/4740-188-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-186-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-184-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-182-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-180-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-178-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-176-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-192-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/4740-172-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-162-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-161-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-194-0x0000000000400000-0x00000000004E8000-memory.dmp

                Filesize

                928KB

              • memory/4740-168-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-166-0x0000000002590000-0x00000000025A2000-memory.dmp

                Filesize

                72KB

              • memory/4740-157-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/4740-160-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/4740-158-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/4740-159-0x0000000002590000-0x00000000025A8000-memory.dmp

                Filesize

                96KB

              • memory/4740-156-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/4740-155-0x0000000004A40000-0x0000000004F3E000-memory.dmp

                Filesize

                5.0MB

              • memory/4740-154-0x00000000021E0000-0x00000000021FA000-memory.dmp

                Filesize

                104KB